

No he also hire people who created a script to make fake ballots with a bias.
https://bsky.app/profile/denisedwheeler.bsky.social/post/3lhowh3ijgs2f
No he also hire people who created a script to make fake ballots with a bias.
https://bsky.app/profile/denisedwheeler.bsky.social/post/3lhowh3ijgs2f
I go for the unoriginal but oh so simple: location-type-No
So HL-SRV-01 is “homelab server no 1”
HS-DSK-02 is “House desktop no2”
NA-LPT-01 is “Not Applicable” because this is my admin laptop that I expect to move around a lot so I always treat it as high-risk.
Maybe they cook only with an air fryer.
To be fair, even in Linux it’s really hard to kill a zombie process. You have to tell the parent to own up to their kid, and then kill the parent.
I’m personlly a zsh+oh-my-zsh person which has the same type of auto complete option.
My only regret is that something broke the thefuck plugin on my pc and now swearing at my screen doesn’t fix my mistakes.
I really like this comic. Just in case someone didn’t know in Linux you can:
-Ctrl + r to search previous commands
Or
-type history and precede the command number by an exclamation (!) to repeat the command (I.e. “!13”)
I’m not the OG on this, just an old reddit post I remembered
https://old.reddit.com/r/ProgrammerHumor/comments/9fhvyl/writing_yaml/
pep8 calls for 4 space but it is a guidance not a rule.
Google internal style guide recommend(ed?) 2 spaces to accomodate the line length limit.
YAML makes you appreciate Python’s 4 spaces indentation.
I consider open source software to be community owned/maintained so I never liked the idea of selling the software. It makes much more sense to my eyes to sell services surrounding the software be it support, customizations, or even hosted services.
I can’t really get over selling a “license” for a software that is expected to still be maintained by unpaid contributors. Especially under an AGPL license where any licensing changes has to be approved by every contributors.
If the attacker search for your password specifically then xkcd themself posted the reason why it wouldn’t really matter
https://www.explainxkcd.com/wiki/index.php/538:_Security
If you’re doing blind attemps on a large set of users you’ll aim for the least secured password first, dictionary words and known strings.
The part where this falls flat is that using dictionary words is one of the first step in finding unsecured password. Starting with a character by character brute force might land you on a secure password eventually, but going by dictionary and common string is sure to land you on an unsecured password fast.
It’s such a different type of stress (and job), people can find fulfilment in either of those while feeling overwhelmed by the other.
I had to implement a GPO to disable suspend on windows 10 AND 11 for everyone at my company equipped with HP zbook laptops because it was requiring a hard reset every… Single… Time.
No amount of bios upgrade ever fixed the issue.