![](https://lemmy.ca/pictrs/image/33f22615-aa41-4fbd-9c09-d635020f2233.png)
![](https://lemmy.world/pictrs/image/9baab42d-186f-448a-94c6-fd932e844d12.png)
Celery responded “If you don’t like it just leaf.”
Celery responded “If you don’t like it just leaf.”
Monthly would be nice, but don’t feel obligated to do it - we’d enjoy it but don’t burn yourself out providing content. What I would suggest though is to make sure you put a big “FAKE” watermark on them to avoid confusing the casual onlooker.
rapid mitosis
As in you are seeing multiple boot entries? It’s likely one entry per kernel version that you have installed. It doesn’t happen often these days any more, but in some situations it’s handy to be able to revert to a previous kernel if for example third party modules break.
Yep, if you request the desktop version you don’t get that redirect.
Or just request the desktop version.
Not sure about erasing all of it, but it is (or was) certainly possible to delete enough of it to brick a motherboard https://www.phoronix.com/news/UEFI-rm-root-directory
A severe lack of imagination.
Not sure what you are talking about. Paragraph 1 has
The malware is delivered through a fake Google Chrome update that is shown while using the web browser.
and the article makes it pretty clear after that that the user is tricked into installing the fake apk.
I don’t know where you got the idea that I’m arguing that old versions don’t get new vulnerabilities. I’m saying that just because a CVE exists it does not necessarily make a system immediately vulnerable, because many CVEs rely on theoretical scenarios or specific attack vectors that are not exploitable in a hardened system or that have limited impact.
The fact that you think it’s not possible means that you’re not familiar with CVSS scores, which every CVE includes and which are widely used in regulated fields.
And if you think that always updating to the latest version keeps you safe then you’ve forgotten about the recent xz backdoor.
For me Hyperion ended up giving me the closest out of the box experience to what I wanted.
I used to be a teaching assistant at university, and never sorted by name. But based on my experience I don’t think it’s frustration that accounts for the disparity, it’s that as you see more and more assignments you start getting a feel for common issues and are able to point them out more easily. I would always do two passes because of that to ensure that I normalized the weight of my marking.
Just because it has a CVE number doesn’t mean it’s exploitable. Of the 800 CVEs, which ones are in the KEV catalogue? What are the attack vectors? What mitigations are available?
You did a recursive chown or chmod, didn’t you.
Here’s a third one: They have a Welcome Stamp visa program where you can work remotely from there for a year, and it’s renewable. You can even bring your family. Under this program you only pay income tax on your country of origin.
Brian Kernighan. Got the chance to have lunch with him!
You can blame Google for that. Their algorithm is built in a way that any page that doesn’t follow a certain format just won’t rank high, and that format doesn’t fit “just the recipe” pages.
If you remove the speeches from Trek, don’t you just end up with the kind of content everyone seems to be complaining about in JJ-Trek?
Correct, and that’s my problem with it: it gets abused too often, so it’s on my “this is why we can’t have nice things” list.
On the other hand it’s a perfect test bed, because there’s sufficient changes of direction and speed, and the fixed infrastructure lets you measure drift. Plus it being underground helps simulate GPS signal being weak or unavailable.