There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

This profile is from a federated server and may be incomplete. Browse more on the original instance.

lemmyng ,
@lemmyng@lemmy.ca avatar

You mean lines that some wall street asshole does off a sheet.

deleted_by_moderator

  • Loading...
  • lemmyng ,
    @lemmyng@lemmy.ca avatar

    CIV:BE sort of scratches the SMAC itch.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Is that why cities are full of rats? Because of heartless bastards that no longer need theirs?

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    When I was younger and more naïve, I used to think a case was useless. I kept my phones in my pocket most of the time, and didn’t feel particularly clumsy or reckless. Then I got a phone that happened to have a glass back, and it broke not because I fumbled it, but because it slid out of my pocket onto time floor while I was sitting down. Glass backs on phones are bullshit.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    I’m out of the loop. How does Carmen Sandiego fit into the whole init system debacle?

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Men not being allowed to be emotionally expressive has led to so many mental health problems…

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    “The Oregon/Idaho line was established 163 years ago and is now outdated,”

    Either accept that earlier laws can be outdated and reinstate Roe v. Wade, or suck it up, ya hypocrites.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Think of that human torso being a very complicated neck rather than a half of a human grown onto a horse.

    Now I can’t stop thinking of centaurs as giraffes with arms stuck to their neck.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    I found the netrunner jobs more entertaining and rewarding. Gangs are tough initially, once you get better weapons you go through them like a hot knife through butter.

    SNES version is very linear by comparison. Do a task, find the key, get to the next area, rinse repeat.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    You can, but you’ll need to increase the microwave’s power accordingly.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Reddit has been astroturfed so much the recommendations there have to be taken with a lot of salt.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    AKA you’ll be removed from the voter pool of you wear it.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    rapid mitosis

    As in you are seeing multiple boot entries? It’s likely one entry per kernel version that you have installed. It doesn’t happen often these days any more, but in some situations it’s handy to be able to revert to a previous kernel if for example third party modules break.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Or just request the desktop version.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Yep, if you request the desktop version you don’t get that redirect.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    It has implications on the effectiveness of VPNs on public networks.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Sure they can. If you put a network behind a router they will share an egress/ingress IP. And there are certain high availability setups where computers share IPs in the same subnet for hot/standby failover.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Phone numbers can be spoofed, and SIM cards can be cloned. The analogy stands.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    When you do call routing with a PBX each phone has an unique extension, equivalent to the private IP of each host.

    Oh, and there’s also anycast, which is literally multiple active devices sharing an IP.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    A phone number does not uniquely identify a phone either.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Laptops don’t get a new IP address every time they switch from one AP to another in the same network either. Your cell phone will get a new IP address if it switches to a different cell network.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Ah, I see we are resorting to ad hominem attacks now.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Whoa, that’s a sizeable edit to the post! Regardless the answer is pretty straightforward: your VOIP client (either the device if you have one or the software) is connected to a VOIP service which acts like a gateway for your client. Since the client initiated the connection to the gateway and is keeping it alive, you don’t need to make any network changes. Once the connection is established, standard SIP call flows (you can Google that for flow diagrams) are followed.

    So no, you router is not part of the cell service. The VOIP provider is part of a phone service that receives calls and routes them for you, just like the cell towers are part of a telephony provider that routes calls through the appropriate tower.

    lemmyng ,
    @lemmyng@lemmy.ca avatar
    1. A static IP is actually not necessary, but what you need is a consistent identifier. For the server, that’s typically a DNS address, but for clients and peer to peer networks there’s other ways to identify devices, usually tied to an account or some other key kept on the device.
    2. For centralised communications yes, you would need an always online server. For decentralised networks, you just need a sufficient amount of online peers, but each individual peer does not need to be always online.
    3. Pretty much, yes. Even push notifications on cell phones work this way.
    4. Route, yes. Manually. VPN is usually not necessary. In modern web-based services this is typically done with websockets, which are client-initiated (so the client address can change), and which allow two-way communication and typically only require a keepalive packet from the client every minute or so.

    There’s other reasons why universal addressing is not done - privacy, network segmentation, resiliency, security, etc. And while IPv6 proponents do like to claim that local networks wouldn’t be strictly necessary (which is technically true), local networks will still be wanted by many. Tying this back to phone numbers - phone numbers work because there’s an implicit trust in the telcos, and conversely there’s built in central control. It also helps that it’s only a very domain specific implementation - phone communication specifications don’t change very often. On computer networks, a lot of work has been done to reduce the reliance on a central trust authority. Nowadays, DNS and SSL registries are pretty much the last bastion of such an authority, with a lot of research and work having gone into being able to safely communicate through untrusted layers: GPG, TOR, IPFS, TLS, etc.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Not sure about erasing all of it, but it is (or was) certainly possible to delete enough of it to brick a motherboard www.phoronix.com/news/UEFI-rm-root-directory

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Not sure what you are talking about. Paragraph 1 has

    The malware is delivered through a fake Google Chrome update that is shown while using the web browser.

    and the article makes it pretty clear after that that the user is tricked into installing the fake apk.

    The Sign (lemmy.stuart.fun)

    For context, in case you don’t have kids (therefor you probably don’t watch Bluey), the family in the car (the Heelers) was selling their house to move for a job but ultimately, the dad (Bandit) decided staying at their house with family was more important. As a final act of demonstration, he lifts the for-sale sign out of...

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Hey, Consul was pretty big for a while. But yeah, Terraform and Vault take the top two spots.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    GM had at one point been working on an eCrate block for conversions, but they seem to have abandoned it.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    For me Hyperion ended up giving me the closest out of the box experience to what I wanted.

    Researchers find lower grades given to students with surnames that come later in alphabetical order (phys.org)

    As graders go on grading, their comments become more frustrated and their good-will becomes much sloppier. At least that's the hypothesis to explain this. Researchers found the reverse effect on graders who sorted in reverse-alphabetical order.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    I used to be a teaching assistant at university, and never sorted by name. But based on my experience I don’t think it’s frustration that accounts for the disparity, it’s that as you see more and more assignments you start getting a feel for common issues and are able to point them out more easily. I would always do two passes because of that to ensure that I normalized the weight of my marking.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Just because it has a CVE number doesn’t mean it’s exploitable. Of the 800 CVEs, which ones are in the KEV catalogue? What are the attack vectors? What mitigations are available?

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    The fact that you think it’s not possible means that you’re not familiar with CVSS scores, which every CVE includes and which are widely used in regulated fields.

    And if you think that always updating to the latest version keeps you safe then you’ve forgotten about the recent xz backdoor.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    I don’t know where you got the idea that I’m arguing that old versions don’t get new vulnerabilities. I’m saying that just because a CVE exists it does not necessarily make a system immediately vulnerable, because many CVEs rely on theoretical scenarios or specific attack vectors that are not exploitable in a hardened system or that have limited impact.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    You did a recursive chown or chmod, didn’t you.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Here’s a third one: They have a Welcome Stamp visa program where you can work remotely from there for a year, and it’s renewable. You can even bring your family. Under this program you only pay income tax on your country of origin.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    To be fair though, the chance that every Lemmy instance goes down at the same time is so much lower than Reddit going down. Sure, my instance might be unavailable, but I’d be able to hop onto the next one and continue.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    Brian Kernighan. Got the chance to have lunch with him!

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    I still have my HP 48 series calculator. It’s a sturdy beast.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    What this actually shows is how much previous governments fucked up and how desperate and angry the Argentine people were that this clown started to look like a good idea. To those with an outside perspective it was always obvious that this would only end badly, but to them it was an “any port in a storm” situation.

    lemmyng ,
    @lemmyng@lemmy.ca avatar

    What’s the scale? It might be a passable seafood fork.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines