![](/static/0b35d4a1/assets/icons/icon-96x96.png)
![](https://lemmy.zip/pictrs/image/9db8a0da-a640-462d-88f2-51419486bdde.webp)
Not the same thing, but I agree
Not the same thing, but I agree
I like both quite a bit, and even got into the hobby culture for each.
Tea is simpler in preparation, but way more complex in terms of varieties. There is a huge difference between a chinese black tea and an assam black tea, even though its the same core ingredient, prepared in a similar fashion.
Coffee on the other hand has fewer varieties, but way more variables in preparation that can drastically change the flavor of your cup. The size of your grind, the brew temperature and the extraction time all have pretty major effects on thr end product.
While many of the CVEs are filed in good faith by responsible researchers and represent credible security vulnerabilities, a recently growing pattern involves newbie security enthusiasts and bug bounty hunters ostensibly “collecting” CVEs to enrich their resume rather than reporting security bugs that constitute real-world, practical impact from exploitation.
Oh, this is once again HR’s fault
The Bucees logo tells me this is probably going to affect Texas more than other regions.
deleted by creator
Not at all.
It’s been well over 20 years since I’ve heard anyone talk about it, and its probably been 25 since I used it myself.
The argument is that “we would like to study these works of art in a purely academic setting, and are willing to limit access to academics only, we just need to make sure it’s going to work even if you guys stop supporting it”
The corporations involved seem to read this argument as “we are looking to start a game streaming service, please give us free access to all your games to distribute at our whim”
I dont see a future where Social engineering is not the most effective type of attack. People have always been the most vulnerable part of any system for the last 12000 years.
Its especially funny that under the hood its just an android app that can run on most existing smartphones (until they blcok access, anyway)
Their idea was to replace a smartphone with a device that just connects to an LLM to do all your smartphone stuff via voice control.
If that sounds like a bad idea, congrats. Youre right.
Use it to program an functional DOS emulator for MacOS 8?
Maybe not a super beginner question, but what do awk and sed do and how do I use them?
Just because F13-F24 isn’t on your keyboard, doesn’t mean those keys don’t exist.
I use F24(bound to a button on my mouse) as my push to talk key.
This is almost certainly Ubuntu server
If you have both the skillset and the mind for it, red team cybersecurity is super interesting, but it’s hard to get into and even harder to do well
I built a cube(a curated collection of cards made for drafting) of all the worst Magic cards ever made.
Most of the cards are worth around $0.05, however my copy of Urza’s Miter currently goes for $22 because of it’s rarity
I ended up installing Magisk, Zygisk, and Play Integrity Fix and can confirm that RCS is working again after it was previously broken on Lineage 21
There are rumors that you can get around this with magisk and the play protect fix.
I’d be curious to know if that has been verified or if it works after you’ve already been blocked
I also use Veeam at home for this. It’s not FOSS, but it is still free, and works really well.
Sounds like things are working like they should.
OF grants full access to a profile and all messages if there is an active investigation. Otherwise, things are kept private.