Hey if you’re colourblind, all blues can be blurple. And so can all purples!
Hey if you’re colourblind, all blues can be blurple. And so can all purples!
The requirement to not track users with cookies does not extend to cookies that make the site work in the first place, such as those which track your login session, or your refusal of other cookies.
Shouldn’t the engineer be a bit more worried if the cable’s been cut?
If UDP drops packets it’s probably nothing. If TCP drops packets it’s because something’s actually wrong.
If you’re using TCP and losing packets you should be panicking though, because something is very wrong…
An overarching principle of security is that of minimum privilege: everything (every process, every person) should have the minimum privileges it needs to do what it does, and where possible, that privilege should be explicitly granted temporarily and then dropped.
This means that any issue: a security breach or a mistake can’t access or break anything except whatever the component or person who had the issue could access or break, and that that access is minimal.
Suppose that you hit a page which exploits the https://www.hkcert.org/security-bulletin/mozilla-firefox-remote-code-execution-vulnerability_20230913 vulnerability in Firefox, or one like it, allowing remote code execution. If Firefox is running as root, the remote attacker now completely controls that machine. If you have SSH keys to other servers on there, they are all compromised. Your personal data could be encrypted for ransom. Anything that server manages, such as a TV or smart home equipment, could be manipulated arbitrarily, and possibly destroyed.
The same is true for any piece of software you use, because this is a general principle. Most distributions I believe don’t let you ssh in as root for that reason.
In short: don’t log in to anything as root; log in as a regular user and use sudo
to temporarily perform administrator actions.
P.S. your description of the situation shows you don’t know the nature of vulnerabilities and security - if you’re running servers then this is something you should learn more about in short order.
<3
Do you mean “blueprint”?
“Prove you’re not a machine by training this machine to pass this exact test.”
There is nothing stupid about this unless you believe that the people behind it had no plan to change out the challenges over time.
you could instead do:
dcl() { docker container ls -aq -f name="$1" }
in bashrc
or wherever you’re setting this up.
Investors may well be interested in how well sequels are going to do. They may well take high player numbers as positive sentiment that is indicative that even new, unrelated titles will sell well.
Why create the function _dcl()
?
Must be time for a new Linux audio system. The pipewire-pulseaudio-ALSA stack of compatibility layers is old hat already.
I remember looking into the situation with non-destructive editing about… 20 years ago. I wonder how long it’s been a desired feature!
If you’re hosting it, prepare to get sued out of existence!
And here I was typing out iso-8859-1
like a scrub to make sure I wasn’t misremembering the encoding when doing the analogous thing in python…
Their employees have failed Unicode college >:(
They don’t have anything to do with alphabets in theory of computation…
So… UTF-8 interpreted as ISO-8859-1? You have failed Unicode college >:(
That’s exactly what a “desktop” client would be anyway: a crappy, memory hogging electron app.
Yes? That’s why loans with collateral charge a lower interest rate than unsecured loans.