IllNess

joined 1 year ago
[–] [email protected] 4 points 1 week ago

I wrote "line"... I have no idea why it says "lube".

I just tried it again and it didn't auto correct to "lube"...

Sorry about that.

[–] [email protected] 6 points 1 week ago (2 children)

She said civilians should be protected and countries should follow international laws. This probably refers to the ruling of the International Court of Justice.

To me she is wagging her finger harder than Biden and it really isn't a stance that something will be done with a lube marked on the ground.

[–] [email protected] 0 points 1 week ago (5 children)

So what are the options? Don't vote and let the president that created a genocide in the borders of the US win?

There never has been a perfect candidate in the history of human kind.

[–] [email protected] -2 points 1 week ago

That explains it.

I have too much hope for humanity.

[–] [email protected] 22 points 1 week ago (18 children)

Why would there be a divide when Trump said he wants Gaza leveled?

[–] [email protected] 150 points 1 week ago (3 children)

Why the fuck would people close to Diaper Dump Trump talk to the press about this?

They want to give you a false sense of security.

Vote like your world depends on it.

[–] [email protected] 19 points 1 week ago

Everyone in the US should freeze their credit. Yes, it sucks that you have to unfreeze it to apply for new credit but it doesn't actually suck that bad. Everything is done through the websites.

Also what ever email you use, enable 2 factor authentication. I think using OTA is better because people have had their numbers sim swapped.

[–] [email protected] 2 points 1 week ago

It's so those companies can connect your profile to your driving record.

Politicians in Texas would love this. They want you to verify your identity to view certain sites.

[–] [email protected] 11 points 1 week ago

A OS backdoor is very simular to a backdoor cut, which allows a player to sneak behind defenders when they are focused on the ball or player with a ball.

NBA coaches have taken inspiration from many different places to perfect their plays. Computer security is just another step.

[–] [email protected] 3 points 1 week ago

Meta enccourages it. It drives up engagement which means more ads viewed and more data gathered.

[–] [email protected] 16 points 1 week ago (1 children)

Don't you mean Clownflare?

[–] [email protected] 36 points 1 week ago (2 children)

Why don't these communicate with each other?

Lidar, 29 cameras, radar and high end CPU and GPU but they can only communicate with other through honking?

Really?

Is this a security feature?

 

"On February 21, 2024, Cencora, Inc. (the "Company"), learned that data from its information systems had been exfiltrated, some of which may contain personal information," reads the SEC filing.

Cencora says they have not determined if the incident will materially impact their finances or operations.

 

"On February 21, 2024, Cencora, Inc. (the "Company"), learned that data from its information systems had been exfiltrated, some of which may contain personal information," reads the SEC filing.

Cencora says they have not determined if the incident will materially impact their finances or operations.

 

After negotiations failed when the game studio refused to pay the $2 million ransom, Rhysida dumped 1,67 TB of documents on its dark web leak site.

"We are aware that the stolen data includes personal information belonging to our employees, former employees, and independent contractors."

 

After negotiations failed when the game studio refused to pay the $2 million ransom, Rhysida dumped 1,67 TB of documents on its dark web leak site.

"We are aware that the stolen data includes personal information belonging to our employees, former employees, and independent contractors."

 

"SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network," Sysdig researcher Miguel Hernández said.

 

"SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network," Sysdig researcher Miguel Hernández said.

 

The five malicious apps are:

  1. Phone Cleaner - File Explorer (com.volabs.androidcleaner)
  2. PDF Viewer - File Explorer (com.xolab.fileexplorer)
  3. PDF Reader - Viewer & Editor (com.jumbodub.fileexplorerpdfviewer)
  4. Phone Cleaner: File Explorer (com.appiclouds.phonecleaner)
  5. PDF Reader: File Manager (com.tragisoap.fileandpdfmanager)
 

The five malicious apps are:

  1. Phone Cleaner - File Explorer (com.volabs.androidcleaner)
  2. PDF Viewer - File Explorer (com.xolab.fileexplorer)
  3. PDF Reader - Viewer & Editor (com.jumbodub.fileexplorerpdfviewer)
  4. Phone Cleaner: File Explorer (com.appiclouds.phonecleaner)
  5. PDF Reader: File Manager (com.tragisoap.fileandpdfmanager)
view more: ‹ prev next ›