Unrelated but the additional padding at the bottom of each page is an unexpected QOL feature I didn’t know I needed.
Unrelated but the additional padding at the bottom of each page is an unexpected QOL feature I didn’t know I needed.
Actionscript, my beloved
I hate how YouTube seems to intentionally show salacious ads if you opt out of ad personalization. I get a ton of Temu spam despite not purchasing anything from that app or even having it on my phone, and the ads themselves usually feature scantily-clad women that takes up 70% of the screen. I’ve made a habit of just opening up the comments section and keeping them open the entire duration of the video. It really feels like YouTube/Google/Alphabet is saying “oh, you don’t want people around you to think you’re a perv? Let us collect more data about you so you can save face in public when you use our app at the gym or at work.”
But Oracle will be leading towards an “offer” to overlook earlier unlicensed software if they agree to sign up to the new subscription model, Biggs said.
So…Oracle is just adopting the mafia mentality to accomplish this? Yeesh.
The tshirt looks really cool
No prob! I think Ars Technica had the best writeup imo: https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/
In a nutshell, a backdoor was intentionally planted by a malicious actor in xz Utils, an open-source data compression utility widely used in Linux and other Unix-like operating systems. This discovery was made by Andres Freund, a developer and engineer working on Microsoft’s PostgreSQL offerings. He was troubleshooting performance problems on a Debian system. Specifically, SSH logins were consuming excessive CPU cycles and generating errors with Valgrind, a memory debugging tool. Through sheer luck and Freund’s careful eye, he eventually discovered that these issues were the result of updates made to xz Utils. Upon closer inspection, he found that updates to xz Utils were the result of a maliciously inserted backdoor. The backdoor, present in xz Utils versions 5.6.0 and 5.6.1, manipulated the sshd executable, allowing anyone with a predetermined encryption key to upload and execute arbitrary code on affected devices.
I must be living under a rock because this is the first I’ve heard of USB 4. Is it just a speed bump or does it affect the type of data that can be transferred? In my experience I’ve had issues using a usb 2.0 flash drive to use a live image of a Linux iso in a 3.1 port
Probably used something like CodeIMG: https://codeimg.io/
deleted by creator
Easy to get caught in a perpetual loop with steps 4 and 5
Don’t commit near a black hole, apparently
And? This is like looking up hammers that don’t leave fingerprints on the grip so you can get away with murder. The tool itself isn’t the issue, the motive is, as well as the person responsible for using it.
deleted by creator
can’t wait
Gonna use this next time someone suggests using excel as a database
Not to view code
deleted by creator
Thanks for sharing, this looks like a really cool tool to use