

Bonus points is you run a fork bomb in parallel and see how far you get. Throw an egg on your heat sink for fun.
Bonus points is you run a fork bomb in parallel and see how far you get. Throw an egg on your heat sink for fun.
If that isn’t already shorthand for “whenever, wherever, whatever” it should be.
As long as there is a list, probably worth mentioning, the new Zig term on the block, ghostty.
wezterm: A GPU-accelerated cross-platform terminal emulator and multiplexer written by @wez and implemented in Rust
This is my favorite terminal emulator and very configurable with lua.
zoxide: A smarter cd command. Supports all major shells.
This is such a handy tool, and the database can be queried for other tools too. Like project switchers or fzf for example.
On a similar note: zellij.
I don’t view it as simply compromised or not. How a password is compromised is relevant. The vast majority of issues aren’t somebody gaining access to your logged in machine. Passwords are nearly always compromised from a server mishandling data.
That means in most cases 2FA near a password is not likely to be an issue. I’m not saying I recommend it, but it does change the risk evaluation.
First I’m finding out a ligature exists. Awesome.
Truffle Shuffle 🤮
FWIW, Anthropic’s models do much better here and point out how problematic demographic assessment like this is and provide an answer without those. One of many indications that Anthropic has a much higher focus on safety and alignment than OpenAI. Not exactly superstars, but much better.
They should have used all caps. Then it would have listened. Oh wait…
Peacock is NBC / Comcast. Colbert was on CBS / Paramount.
Also Servo is now under the Linux Foundation. Both this and Ladybird are very exciting.
I got a privacy update for Gmail tools too. It used to be to enable smart tools you needed to allow google to read your email. That does stuff like automatically add calendar events for flights and such.
Now you must also allow the email to be read by their AI services too. I can’t recall precisely how it was worded, but it was an easy decision to keep the “smart” features off.
I mean, I really just use Gmail as the email address I give to sign up for sites and such, but would be good just not to have it one day.
If only there were a word, literally defined as:
Made by humans, especially in imitation of something natural.
I hate that. I’m looking at you Healthline. I hate that it’s always so high in the results.
Not liking Apple for ethical reasons is one thing, but thinking they don’t make good products surprises me. I think the current generation of MacBooks are some of the best computers ever sold.
By denying access to resources in a primary region, one might force traffic to an alternate infrastructure with a different configuration. Or maybe by overwhelming hosts that distribute BGP configurations. By denying access to resources, sometimes you can be routed to resources with different security postures or different monitoring and alerting, thus not raising alarms. But these are just contrived examples.
Compromising devices is a wide field with many different tools and ideas, some of which are a bit off the wall and nearly all unexpected, necessarily.
Disabling network security and edge devices to change the properties of ingress can absolutely be a component of an attack plan.
Just like overwhelming a postal sorting center could prevent a parcel containing updated documentation from reaching the receiver needing that information.
I love Zen.