

Man it sure is crackers to slip a rozzer the dropsy in snide.
Seer of the tapes! Knower of the episodes!


Man it sure is crackers to slip a rozzer the dropsy in snide.


There is no such thing as an innocent billionaire.
Pfft. Real programmers use butterflies


A standard reference model in 3d modeling.


Looks like compatibility hacks for various websites.
Interventions - are deeper modifications to make sites compatible. Firefox may modify certain code used on these sites to enforce compatibility. Each compatibility modification links to the bug on Bugzilla@Mozilla; click on the link to look up information about the underlying issue.
User Agent Override - change the user agent of Firefox when connections to certain sites are made.
https://wiki.mozilla.org/Compatibility/UA_Override_&_Interventions_Testing


The value of the DNS is that we all use the same one. You can declare independence, but you’d lose out on that value.


For some reason this specific graphic has always been one of my favorite parts of this movie.
Edit: I love the internet sometimes https://www.youtube.com/watch?v=94jIQm0YcCs


Does the library provide ethernet jacks for patrons to use? If not then I can understand why a librarian would be surprised.


Install SponsorBlock.


To the boiler room of hell. Allll the way down.
You Linux users sure are a contentious people.


Fun fact: The Windows executable format is originally based on an old Unix executable format.


Partner represents and warrants that it shall not introduce into WhatsApp’s Systems or Infrastructure, the Sublicensed Encryption Software, or otherwise make accessible to WhatsApp any viruses
The technical definition of a “computer virus” is actually quite narrow, and true viruses are rare these days because they are passive and slow compared to more modern malware types.
A strict, literal reading of the text says that all other kinds of malware are acceptable.


I tend to support this idea. If inputting copyrighted materials isn’t infringement then neither should taking the output be.


That’s kind of the point.
Clementine originally forked from Amarok 1.4 because Amarok 2.0 changed too much.
E-mail is a lingua franca. It’s used not because it’s superior, but because you don’t have to worry about whether your recipient is using the right software setup to receive your message. It’s the lowest common denominator of internet messaging and can only be replaced in that role by a new lowest common denominator.


Even the researcher who reported this doesn’t go as far as this headline.
“I am an admin, should I drop everything and fix this?”
Probably not.
The attack requires an active Man-in-the-Middle attacker that can intercept and modify the connection’s traffic at the TCP/IP layer. Additionally, we require the negotiation of either ChaCha20-Poly1305, or any CBC cipher in combination with Encrypt-then-MAC as the connection’s encryption mode.
[…]
“So how practical is the attack?”
The Terrapin attack requires an active Man-in-the-Middle attacker, that means some way for an attacker to intercept and modify the data sent from the client or server to the remote peer. This is difficult on the Internet, but can be a plausible attacker model on the local network.
Reminds me of the old trick on HTML forms where you use CSS to make one of the form fields invisible to humans and reject any submission that filled in that field.