

Unless the bad guys got to time travel first… then every timeline becomes the bad timeline.
Unless the bad guys got to time travel first… then every timeline becomes the bad timeline.
I’ve always experienced the opposite - native English speakers are horrible at spelling because they don’t have to put any effort into comprehending the language, vs non-native speakers who frequently have to take ESL tests for either academia, work, or immigration, and therefore had more exposure to spelling practice.
And get rid of the pornoscanners.
That’s a lot of QoL improvements, specially for endgame crafting!
You’re missing the forest for the tree here.
Given identical client setups, two clones of a git repo are identical. That’s duplication, and it’s an intentional feature to allow concurrent development.
A CDN works by replicating content in various locations. Anycast is then used to deliver the content from any one of those locations, which couldn’t be done reliably without content duplication.
Blockchains work by checking new blocks against previous blocks. In order to fully guarantee the validity of a block you need to guarantee every block, going back to the beginning of the chain. This is why each root node on a chain needs a full local copy of it. Duplication.
My point is that we have a lot of processes that rely on full or partial duplication of data, for several purposes: concurrency, faster content delivery, verification, etc. Duplicated data is a feature, not a bug.
I would argue that duplication of content is a feature, not a bug. It adds resilience, and is explicitly built into systems like CDNs, git, and blockchain (yes I know, blockchains suck at being useful, but nevertheless the point is that duplication of data is intentional and serves a purpose).
The most stupid argument I’ve seen is from an American who said “what if you don’t know about the effects of a drug that could save your life?”
If only there was a system of interconnected knowledge bases where new information could be published and indexed for easy lookup… Nah what am I saying, who would have interest in such a thing…
Most scroll wheels use an optical sensor inside the housing to monitor the motion of the wheel. If you got paint inside the housing then it can confuse the sensor.
Question: did you take off the top of the mouse to paint it, or at least tape off any areas that needed to be protected like the scroll wheel and the bottom sensor?
#Never51
I remember that post from slazer2au… https://lemmy.world/post/19338754
When we talk about 2.4, 5, or 6 GHz the devices don’t operate at exactly that frequency, but within a band more or less on that number. For example 5 GHz is actually a set of channels between 5150 and 5895 MHz.
Why isn’t there a 3Ghz, 3.5Ghz, 4Ghz, etc?
Technically there’s 802.11y (3.65 GHz), 802.11j (4.9-5.0 GHz), etc. It’s just that several of these bands cannot be used universally across the globe, because they may be reserved for other purposes. By and the bands that end up being used are ones that don’t require licensing to operate.
Reference: https://en.wikipedia.org/wiki/List_of_WLAN_channels
That doesn’t hold water.
Why is CloudFlare observing user passwords???
The most likely explanation for requesting a video is to weed out low quality AI-generated “vulnerability” submissions that hallucinate code that doesn’t compile or APIs that don’t exist. In that context a 1 minute video showing that the report is viable is not much to ask for.
[The signs] are placed along Hurricane Road at the last major intersection before arriving at the bridge crossing. Basically, there’s no way to miss them.
The reporter overestimates most truck drivers’ situational awareness.
I don’t know where you got the idea that I’m arguing that old versions don’t get new vulnerabilities. I’m saying that just because a CVE exists it does not necessarily make a system immediately vulnerable, because many CVEs rely on theoretical scenarios or specific attack vectors that are not exploitable in a hardened system or that have limited impact.
The fact that you think it’s not possible means that you’re not familiar with CVSS scores, which every CVE includes and which are widely used in regulated fields.
And if you think that always updating to the latest version keeps you safe then you’ve forgotten about the recent xz backdoor.
Just because it has a CVE number doesn’t mean it’s exploitable. Of the 800 CVEs, which ones are in the KEV catalogue? What are the attack vectors? What mitigations are available?
“You done messed up, A-A Ron!”