![](https://startrek.website/pictrs/image/d1dfc6ea-8cfc-49d6-b703-1454d36b30cf.png)
![](https://lemmy.world/pictrs/image/44bf11eb-4336-40eb-9778-e96fc5223124.png)
Your sandwiches would be even better if they were eaten by me.
Seer of the tapes! Knower of the episodes!
Your sandwiches would be even better if they were eaten by me.
One that you didn’t have to make for yourself.
I think you’re thinking of an open relay, not a catchall mailbox.
So can a dotfile, or any other kind of storage. There’s really nothing inherently bad about the registry. Its reputation as a place to hide things in is equal parts selection bias, users’ lack of technical understanding, and the marketing of “registry cleaner” apps.
Unpopular opinion: The Windows Registry, a centralized, strongly typed key:value database for application settings, is actually superior to hundreds of individual dotfiles, each one written in its own janky customized DSL, with its own idea of where it should live in the file system, etc.
Partner represents and warrants that it shall not introduce into WhatsApp’s Systems or Infrastructure, the Sublicensed Encryption Software, or otherwise make accessible to WhatsApp any viruses
The technical definition of a “computer virus” is actually quite narrow, and true viruses are rare these days because they are passive and slow compared to more modern malware types.
A strict, literal reading of the text says that all other kinds of malware are acceptable.
And I was always wondering how come Republicans are perceiving themselves as devout Christians while the political party they support is openly opposing those virtues and if this doesn’t make them hypocrites?
That’s exactly what it makes them. By the Biblical definition of a hypocrite. Jesus literally talks about what that means.
Jimmy Gibbs, Jr!
They look like they’re posing for their album cover.
The Bible condones slavery. And many slave holders invoked the Bible to justify slavery.
From Frederick Douglas’ first autobiography:
Were I to be again reduced to the chains of slavery, next to that enslavement, I should regard being the slave of a religious master the greatest calamity that could befall me. For of all slaveholders with whom I have ever met, religious slaveholders are the worst. I have ever found them the meanest and basest, the most cruel and cowardly, of all others.
Full blown de jure chattel slavery? Yes, I would be surprised.
Slavery didn’t end because people realized it was bad. They always knew that. It ended because of the industrial revolution.
Remember Valentine’s day 2004, when San Francisco county started issuing marriage licenses to same-sex couples?
Thousands of couples showed up. Some from the other side of the planet, some from the other side of town. The County Clerk was overwhelmed and there weren’t nearly enough wedding officiants to keep up. So they put out a call for volunteers to be deputized by the Clerk as county marriage commissioners. I volunteered and officiated at dozens of ceremonies at city hall.
Still have my official commission hanging on my wall.
These would be ‘rebel’ states are among the poorest and most heavily dependent on federal subsidies. They need the US more than the US needs them.
That’s kind of the point.
Clementine originally forked from Amarok 1.4 because Amarok 2.0 changed too much.
I would be deeply confused.
I’m not interesting enough to worry about people being unduly interested in me.
Yes. But not the “main” jaw muscle that gives up/down biting force. It’s the ones that let you move your jaw side-to-side and forward/back. Especially the forward/back ones.
Jaw muscles. They extend up past the ear and over the head.
Even the researcher who reported this doesn’t go as far as this headline.
“I am an admin, should I drop everything and fix this?”
Probably not.
The attack requires an active Man-in-the-Middle attacker that can intercept and modify the connection’s traffic at the TCP/IP layer. Additionally, we require the negotiation of either ChaCha20-Poly1305, or any CBC cipher in combination with Encrypt-then-MAC as the connection’s encryption mode.
[…]
“So how practical is the attack?”
The Terrapin attack requires an active Man-in-the-Middle attacker, that means some way for an attacker to intercept and modify the data sent from the client or server to the remote peer. This is difficult on the Internet, but can be a plausible attacker model on the local network.
deleted by creator