

I was over 900 on several torrents before switching clients about a year ago. I have a few in the 300s now.
I was over 900 on several torrents before switching clients about a year ago. I have a few in the 300s now.
Atomicity: either all parts of the transaction complete, or all parts of the transaction don’t complete; there’s no “partly complete” state
Consistency: the state of the database after a transaction is stable; all “downstream” effects (e.g. triggers) of the query are complete before the transaction is confirmed.
Isolation: concurrent transactions behave the same as sequential transactions
Durability: a power failure or crash won’t lose any transactions
Traditionally, ACID is where relational databases shine.
Wow, I’d love to Kyll myself on a hot, summer’s day!
I guess not too different from pr0n, h4x, etc. Maybe a tale as old as time?
See also: s*x, k*ll, r*pe, etc.
A /8 subnet is basically everything after the first of the four segments, e.g. 127.*.*.*. marine_mustang was saying that loopback (what you think of as only 127.0.0.1) is actually an entire subnet, so any address that starts with 127 will hit the loopback interface. TIL, never thought about it much before.
A highly respected school teacher of mine was known to say, “Say what you mean; mean what you say.”
I haven’t tried it yet, but I’ve seen massive lists of trackers floating around that you can add to your torrents, in case the same torrent is indexed on other trackers, but the torrent file you downloaded doesn’t know to search them.
I can think of easier ways of compromising the data besides brute forcing the keys, off the top of my head, and I’m just some schmuck. Relevant XKCD: https://xkcd.com/538/
Compromise their endpoint with a malicious app on the app store.
Gain physical access to the device and compromise it. Use your imagination – pickpocket, traffic stop or customs inspection by a compromised agent, seduce them with a honeypot, etc.
Socially engineer them to mistakingly add you to their group chats.
SIM swap
Signal might be fine for journalists, criminals, cheating spouses, and general privacy when used properly with good OpSec but nation state adversaries have significantly greater resources than your average attacker, and thus require more significant security.
If trump starts sending people to gas Chambers and murdering races he didn’t like, I’ll be there with you screaming ‘nazi Hitler’ at the top of my lungs
When I call Trump and Musk Nazis, I’m not talking about concentration camps or genocide as with 1940 Nazis either. I’m referring to 1933 Nazis which were using demonization of others, attacking independent media, and The Big Lie to consolidate power. These are what made the Holocaust possible.
In 2022 they added a paywall to the feature which was previously free to all users of a Plex Pass server. https://support.plex.tv/articles/downloads-sync-faq/
In 2022 they added a paywall to the feature which was previously free to all users of a Plex Pass server. https://support.plex.tv/articles/downloads-sync-faq/
First they removed downloads and now this? Feels shitty. I used this feature weekly to watch a show with a remote friend.
Head’s up – there’s a law firm which many on RFD are talking about being served demand letters from, after repeated warnings were ignored.
Don’t worry though, the demand letters are largely baseless and unenforceable, especially since the SCoC ruled last year that service bill payers are not responsible for the actions of their network users.
Merged -> gone gold
Deployed -> gone platinum
Gone a week without crashing production -> triple platinum
So they’re one of us? Welcome to the club, outlaws!
I’m pretty sure they mean half as much.
Did you do anything to stop the violent ego maniac in the White House? No? Then you’ve cooperated with him.
I think this post is about git CLI, not www.github.com.
SSH keys are very secure and you can still encrypt them with a password if you wish.