

You can permit absolutely everything and make it just as bad as the stock OS if you want to.
You can permit absolutely everything and make it just as bad as the stock OS if you want to.
The single biggest attack vector for SSH is IPv4. Disable it and 99% of issues go away.
HellDivers 2 runs like a dream. It plays because it’s not PvP.
The problem with every PvP game is that they refuse to allow players online unless they have kernel-level anticheat. That’s a dealbreaker, and nobody will negotiate on it.
I really struggle to process voices, but I hear absolutely everything.
Someone talking to me can get completely drowned out by a 15KHz hum of an electronic device, the acoustics of a room or a TV in the background.
Yet, I ask them if they are having trouble hearing me over all the noise. They usually reply “wharlt noise?” If it’s a high-pitch hum, they won’t acknowledge the noise even if I show them on a spectral analyser.
I’ve used this. The only annoyance is that all the on-screen timestamps remain in UTC because JS has no idea what timesone you’re in.
I get that TZ provides a piece of the fingerprint puzzle, but damn it feels excessive.
So, manifest v3 was all about preventing Google’s competitors from tracking you so that Google could forge ahead.
Well… shit. My company just sold my department to another company. The phrase they use in the office is “a Microsoft shop”. We’re talking Windows, Teams, Azure and O365.
The transition is going to be shit. After the transition is over, it will be shit.
I might just operate my workflow entirely out of WSL2 out of spite.
Sharing a video about a Google security vulnerability on Google’s own platform. What would you expect?
There’s probably a few things you can do live on a call.
I always wanted to try passing a common function through a minifier then a beautifier. Show them the code with unhelpful variable names, and ask them what name they would give the function.
A good programmer would be able to identify a string compare function or an IP bitmask eval function pretty quickly.