There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

technology

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

How much would hash digsets shortened if the whole alphabel was used

The sha1 hash for 64test64xa is 6779c53432b8badf049bb9d8924a5785dd887243 which is 41 characters only using hexadecimal, 10digits and 6letters. But how long it would be if it was using the whole 26 letters in the latin alphabet? What if it also differentiated between UPPER and lower cases?

Microsoft stole my Chrome tabs, and it wants yours, too (www.theverge.com)

Last week, I turned on my PC, installed a Windows update, and rebooted to find Microsoft Edge automatically open with the Chrome tabs I was working on before the update. I don’t use Microsoft Edge regularly, and I have Google Chrome set as my default browser. Bleary-eyed at 9AM, it took me a moment to realize that Microsoft...

Amazon- and Google-backed AI firm Anthropic says “general-purpose AI tools simply could not exist” if AI companies had to pay licences for the training material (www.computerweekly.com)

Generative artificial intelligence (GenAI) company Anthropic has claimed to a US court that using copyrighted content in large language model (LLM) training data counts as “fair use”, however....

The Global Green Energy Transition Has an Uyghur Forced Labor Problem, Report Says (investorsforhumanrights.org)

The solar and electric vehicle industries are critical for the world’s urgent transition away from fossil fuels. However, both industries source many of their critical inputs from the Uyghur Region, a region where the Chinese government is systematically persecuting the native Uyghur, Turkic, and Muslim-majority peoples,...

Thoughts on BOOX Tab Ultra C? (shop.boox.com)

Does anyone here have a BOOX e-paper tablet? I’m a big fan of e-paper devices—I love my Pebble smartwatch, Kindle Paperwhite, and Light Phone II. I’ve been eyeing the Tab Ultra C for quite a while, and I am considering the pros and cons. Mostly, I intend to use it for browsing the web and maybe some light note taking and...

The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE (arstechnica.com)

Cozy Bear, classified by the United States federal government as advanced persistent threat APT29, is a Russian hacker group believed to be associated with one or more intelligence agencies of Russia. The Dutch General Intelligence and Security Service (AIVD) deduced from security camera footage that it is led by the Russian...

Krebs on Security: "Using Google Search to Find Software Can Be Risky" (krebsonsecurity.com)

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make...

‘Significant security loophole’ found in Google software container system (therecord.media)

The issue affected Google Kubernetes Engine (GKE), a system used to deploy, scale and manage how applications are “containerized.” GKE — the tech giant’s implementation of the open-source Kubernetes project — is used widely in healthcare, education, retail and financial services for data processing as well as...

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines