

Good was murdered! Never forget these atrocities.
This is a secondary account that sees the most usage. My first account is listed below. The main will have a list of all the accounts that I use.
Garbage: Purple quickly jumps candle over whispering galaxy banana chair flute rocks.


Good was murdered! Never forget these atrocities.


So what, there’d be dozens at best, and the rest hired? Fuck billionaire thieves. They shouldn’t exist.


They’re quite fond of kids in general. A bit too fond.


Media using kid gloves again for fear of retaliation.


Congress even passed a law as I recall demanding their release over a month ago, but the phile’s files seem like they’re never coming out, continuing to break the law in the process.
I installed TF2 on a Mac with only integrated graphics in college and played a ten to twelve FPS slideshow for years.
It was Debian as well.


It’s not just that. Imagine the dependency management trying to hold onto 32 bit compatibility.
This doesn’t look like Arch.


You’re technically correct. That’s the best kind of correct.


I have a simple pile of Markdown files that I edit with Obsidian. I like the simple text file format because it keeps my documentation forwards-compatible. I use OpenWRT at the heart of my network, so I keep I right there in root’s home. Every long while I back it up to my general Documents which is then synced between my high-storage devices with SyncThing.


It’s the first feature I disabled. It’s like they never considered I might place an item on the backseat.


This person doesn’t serve to be called Doctor. He failed.


Nope, it’s screaming metal deathtrap or the feature that beeps if someone is detected picking their nose and can only be reset by the vendor.
We need ranked choice voting so badly.


I remember seeing this article before. Keep in mind that the publisher of the report has a financial interest in promoting their AI’s “agentic” capabilities. In the report they state that AI can replace skilled teams of hackers. For a target taking security even somewhat seriously, that statement is hard to believe and really underlines their financial incentive.
I argue this isn’t novel at all. At the end of the day, you’re still generally scanning the Internet for vulnerable systems. Script kiddies have been using this broad recipe for decades. I think this is more accurately an incremental improvement in automation rather than the paradigm shift that Anthropic would have you believe.


Is this the jailbait mod guy?


An unmanaged switch is a simple, zero-configuration network device that connects multiple Ethernet devices together. This is by far the most common type of switch because they’re cheaper to make and satisfy most needs in the home and small office. There are no settings to configure, and the device generally avoids inspecting the traffic it switches. Unmanaged switches are commodity products that are all pretty much same, varying only in the number of ports and speeds provided, and produced in large volumes.
Managed switches add a central CPU for device administration. This design enables configuration settings which is usually an important precursor to have features such as VLANs, QoS, IGMP snooping, and port security. Businesses usually need managed switches to implement security policies. In addition to the added hardware, businesses have deeper pockets, and managed switches are no longer simple commodities because comparing the advanced feature set and software is no longer trivial. Professional managed switches can cost thousands.
Only recently have we seen pro-sumer switches occupy the space in between these two options by offering some managed features (VLANs) while reserving necessary enterprise features (port security, DHCP snooping, reporting) to segment the market. I bought one for $25 the other day which is almost the same as an unmanaged switch. I would no longer recommend buying an unmanaged switch to anyone with even a passing interest in home networking.
Exactly. They own the US and are not subject to laws. Only you are.