20 years? more like 5
20 years? more like 5
start with basics:
iperf
on every device you can between an external device and your internal host(s) and use it to find any bottleneckstcpdump
to analyze packets flowing over the network. you can often find surprising results this wayiperf
) with the most simple config (no nginx etc) and add the complexity of your config bit by bit until the issue returnsyou’re so close, just why exactly do you think people are using it for these things it’s not meant for?
because every company, every CEO, every VP, is pushing every sector of their companies to adopt AI no matter what.
most actual people understand the limitations you list, but it’s the capitalists at the table that are making AI show up where it’s not wanted
TLS doesn’t encrypt the host name of the urls you are visiting and DNS traffic is insanely easy to sniff even if you aren’t using your ISPs service.
the hostname of a website is explicitly not encrypted when using TLS. the Encrypted Client Hello extension fixes this but requires DNS over HTTPS and is still relatively new.
just a guess, but in order for an LLM to generate or draw anything it needs source material in the form of training data. For copyrighted characters this would mean OpenAI would be willingly feeding their LLM copyrighted images which would likely open them up to legal action.
computer science teaches you the theories of computation which absolute starts with mechanical computers.
if one didn’t study Turing’s tape machine in their compsci program then they should demand their money back.
open source software getting backdoored by nefarious committers is not an indictment on closed source software in any way. this was discovered by a microsoft employee due to its effect on cpu usage and its introduction of faults in valgrind, neither of which required the source to discover.
the only thing this proves is that you should never fully trust any external dependencies.
it literally explains what they’re for in the product listing:
These labels aid your warehouse operations.
• Categorize inventory, reorder points, product dating or special instructions.
• Apply these labels to pallets, boxes and shelves for easy identification.
• Easy to write on.
a decentralized community that correctly prioritizes security would absolutely be using signed commits and other web-of-trust security practices to prevent this sort of problem
butane inserts are great for a lot of people, but there’s just no beating the nostalgia of that og flame. if you use your lighter regularly it’s easy enough to keep it topped off every two weeks or so.
zippo also sells a small fuel canister that is airtight, if you keep a bag on you that’s a great way to have a backup
faster can still lead to battery life improvements. if the CPU is able to complete tasks in less time, it can then enter a lower power state sooner which will result in less battery usage overall
SMS is literally the bottom of the barrel though
deleted by creator
and that has nothing to do with the MSM making them think that way?
have you ever considered that the whole “left”, “right” “center” labels are meaningless to real people? they’re a tool of the same MSM you mention to make people think there’s more of a divide than there is.
sure there are ideologies that those labels can roughly categorize, but real people with real opinions rarely fit neatly into simple categories
assuming you have a GNU toolchain you can use the find
command like so:
find . -type f -executable -exec sh -c '
case $( file "$1" ) in (*Bourne-Again*) exit 0; esac
exit 1' sh {} \; -print0 | xargs -0 -I{} cp {} target/
This first finds all executable files in the current directory (change the “.” arg in find to search other dirs), uses the file
command to test if it’s a bash file, and if it is, pipes the file name to xargs
which calls cp
on each file.
note: if “target” is inside the search directory you’ll get output from cp
that it skipped copying identical files. this is because find
will find them a free you copy them so be careful!
note 2: this doesn’t preserve the directory structure of the files, so if your scripts are nested and might have duplicate names, you’ll get errors.
why use docker here? you’re just adding layers of abstraction in an environment that can’t seem to really support them.
that said, switching to 32bit linux, if the VPS supports it, will save you memory.
a surprisingly disappointing article from ars, i expect better from them.
the author appears to be confusing “relay attacks” with “cloning” and doesn’t really explain the flow of the attach that well.
really this just sounds like a complicated MitM attack, using the victim’s phone as the “middle” component between the victim’s physical card and the attacker’s rooted phone.
the whole “cloning the UID attack” at the end of the article is irrelevant, NFC payment cards don’t work like that.