

Whoever came up with that stupid word filter and decided to follow through on it without proper human review that the filter matched what they meant to find, is pretty trans-intelligent.
Whoever came up with that stupid word filter and decided to follow through on it without proper human review that the filter matched what they meant to find, is pretty trans-intelligent.
The company has not released information on whether, or how long, it has spent mapping out or testing the driverless technology on Austin’s streets.
That’s being too nice, the CEO is clearly proud of not mapping cities, as seen in the tweets. The journalist should call it out explicitly. “They are probably not mapping as suggested by the CEO’s public posts.” That’s not too much of a leap.
I wonder how betrayed the people in the Appalachian feel when their supposed “own” Vance stood for this.
They are hardly even in the US market. Only via Murena with their e/OS/.
Those are both way more useful than exploiting a lazy coder’s fuckup
I never said social engineering, physical breaching, exerting force on people, and other ways of compromising systems weren’t useful. They just aren’t hacking to me, otherwise the term is too broad to be very useful.
You’re free to come up with your own definition, I was asked to define it and that’s my best shot for now.
You know my first instinct wast to reply with: “No.”
Maybe I should have stuck with that. I had a feeling this would lead nowhere.
I’d start with the following, and refine if necessary:
“Gaining unauthorized access to a protected computer resource by technical means.”
* Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
** The governor and his idiot troupe eventually stopped their grandstanding and didn’t file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily
I haven’t heard of a firewall failing open when overwhelmed yet. Usually quite the opposite, a flood disables access to more than just the targeted device, when the state table overflows.
But maybe there is a different mechanism I’m not aware of. How would the DDoS change the properties of ingress?
DDoS is not hacking
Ist das beim TÜV auch gestaffelt, dass Neuwagen noch nicht so oft müssen?
Bei uns in der Schweiz ist es typischerweise so 5, 3, 2, 2, 2, 2 Jahre. Aber wie immer sind wir zu föderalistisch, als dass es einheitlich wäre
I don’t get along well with people who aren’t at least within “discussing distance” politically. I wonder how people even date when they don’t agree on some fundamentals.
They do actually burn gas locally, I wasn’t trying to dispute that part. It has become a political discussion in Memphis. Apparently they wanted to start operations on turbines before the grid access was ready.
The petit pipi is very funny to me for some reason.
I also appreciate the translation of “???” for “???”
The linked video is a bit unclear to me. The don’t explain the modes well. Mostly it seems to just show heat. According to the description it’s a Teledyne FLIR G620, which should be able to detect Methane and other VOCs. But it’s not clear to me how we are supposed to distinguish hot rising CO2 and H2O from any potentially leaking Methane, in those pictures.
Video in question https://www.youtube.com/watch?v=4prazMVylRs
Claim Musk is a dangerous foreign influence and force a sale like for Tiktok
though you’d need to supply power
Go for really old ones with the crank handle for ringing. Like from army surplus and you don’t need the power :-)
We played around with these for a day in the army https://en.wikipedia.org/wiki/Feldtelefon_50 when you crank the handle while your friend is still putting down the line you can shock them.
6 arc seconds, not a very well rounded individual
Friend of mine had the same scenario in high school. The only one who knew was the twin sister of the girlfriend. The rest of the family would never have accepted a non-muslim. It’s probably the only way to do this until she’s an adult and can tell them to fuck off.
Pre-UEFI they were fighting over the boot sector, sure, but now that everything is more well defined, and every OS can read the FAT32 ESP? Never seen it…
At worst the UEFI boot entry is replaced. There are some really shitty UEFI implementations out there which only want to load \efi\microsoft\boot\bootx64.efi
or \efi\boot\bootx64.efi
, or keep resetting you back to those.
Assuming you were dumped into Windows suddenly, you can check if you have the necessary boot entries still with bcdedit and its firmware option
bcdedit /enum firmware
If you just have a broken order you can fix it with
bcdedit /set {fwbootmgr} displayorder {<GUID>} /addfirst
If you actually need a new entry for Linux it’s a bit more annyoing, you need to copy one of the windows entries, and then modify it.
bcdedit /copy {<GUID1>} /d "Fedora"
bcdedit /set {<GUID2>} path \EFI\FEDORA\SHIM.EFI
bcdedit /set {fwbootmgr} displayorder {<GUID2>} /addfirst
Where GUID1 is a suitable entry from windows, and GUID2 is the one you get back from the copy command as the identifier of the new entry. Of course you will have to adjust the description and the path according to your distro and where it puts its shim, or the grub efi, depending on which you’d like to start.
Edit: Using DiskGenius might be a little more comfortable.
Yes it’s very common, which is why everyone of even mild intelligence knows to check the results of a plain full text search.