But still the sunken stars appear
In dark and windless Mirrormere;
There lies his crown in water deep,
Till Durin wakes again from sleep.
- 100 Posts
- 714 Comments
Ah… I will never forget the first time I stood up to my bullies. Grabbed a badminton racket during recess and smashed his fucking front teeth out. Somehow I was still the bad guy, got detention and was forced to write an apology letter to the piece of shit’s parents and a letter to my mom explaining what I did wrong.
Holy shit. Now THIS is pod racing I mean a great hack!
durinn@programming.devOPtoPiracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Xsplit 3 month licenseEnglish
1·1 day agoI think I had this same webcam about… Ten years ago? Full HD, autofocus… If it is indeed the same product, maybe the included “pamphlet” is old as F too.
durinn@programming.devto
linuxmemes•how can mobile phones possibly get hacked ?? I mean we use Android or iOS phones, which are pretty much secure, right ??🤔🤔🤔
4·1 day agoI hate what popular culture has done with our perception of hacking. Hacking almost always involves social engineering as a means to open a backdoor into a system: you trick the end user into for instance giving up login credentials or installing a program that “phones home” to a command and control center. You’ll have to research the details on your own, but depending on what information has been “phoned home” or in other ways acquired by the adversary (login credentials, IP address, hardware and software identifiers, etc.), the adversary can then deploy further tools that either exploit known programmatic vulnerabilities or that elevate the adversary’s privileges on the target system, with the goal of attaining enough control to do whatever the objective was in the first place (gathering PII, bank info, leaking private media, distortion, what have you…).
Android is great at a very specific task, which is to isolate processes into something I can’t seem to recall right now… Maybe “zygotes”? Basically it gives the user granular control over interprocess communication. It also effectively reduces attack surface by isolating infection/damage.
On Windows, for instance, programs are allowed to elevate their own privileges - for the convenience of the end user, I suppose - which is of course INSANE, considering that the greater Windows user base probably don’t have the cyber hygiene required to operate safely within those premises.
I’m too sleepy to go on, but “google” and read: hacking, backdoor, exploit, social engineering, privilege elevation
durinn@programming.devOPtoPiracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Xsplit 3 month licenseEnglish
5·1 day agoAhahahaha yeah xD well, at least it makes me happy that this is more than not enlightened community :D
durinn@programming.devOPtoPiracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Xsplit 3 month licenseEnglish
14·1 day agoProbably a “grey hat” scam. As in, three months for free, but probably requiring a credit card, which then automatically gets charged after the first three months, hoping that the user simply doesn’t have the patience to unsubscribe or something.
durinn@programming.devOPto
Privacy@lemmy.ml•[Shitpost] Nooo... Lost my last unregistered SIM-card 😢
3·1 day agoMy guess is that there definitely could be some sort of underground market for them, but as I understand the legislation, using them would be illegal.
But then again, if one really requires privacy, telephones and SMS are some of the worst options for communication. In the current state of things, I’d simply use an end to end encrypted chat app, preferably one that implements the Signal protocol.
This looks like a neat and simple enough setup! Thank! :)
durinn@programming.devOPto
Privacy@lemmy.ml•[Shitpost] Nooo... Lost my last unregistered SIM-card 😢
2·1 day agoThere are no VoIP solutions in my region for the very same reason. They call it their “war on crime”.
durinn@programming.devOPto
Privacy@lemmy.ml•[Shitpost] Nooo... Lost my last unregistered SIM-card 😢
2·1 day agoNo. Both data-SIMs and prepaid cards require the buyer to reveal their name, address and social security number over the counter and online. The retailer is also compelled to verify the buyer’s identity, either electronically or physically (ID card).
I watched it for the first time when I was about 20 years old, back in 2019, I think. I loved it, because it was new and exotic. It used a lot more ambience and atmosphere for storytelling than I has seen any other anime do. Not to talk about the classic drawing style, which in itself is gold. What sucked was when it tried to be edgy and preachy. I’m sure the manga doesn’t suffer the same shortcomings since it’s not limited by runtime restrictions. Which is to say, there is nothing wrong with the story either. 😃
It was neither my first nor the only anime I watched.
durinn@programming.devto
No Stupid Questions•Do you ever get the feeling of zooming out of your phone into your head and actually realizing everything, instead of just mindlessly watching videos?
3·2 days agoFortunately, I was busy experiencing foreign cultures abroad when that kind of media consumption took off, so I dodged it and never got hooked. Considering that I may only live once, nothing gives me greater anxiety than imaging a life that I wasted on nothing. While this video is sort of sarcastic, it also sort of isn’t.
durinn@programming.devto
Showerthoughts•If you reverse the polarity of a fire-alarm, you get a fire-starter.
2·3 days agoThanks! You just nudged me down a fascinating rabbit hole: https://www.youtube.com/watch?v=eflB18WmbjM
Whaaa… :(
durinn@programming.devto
Showerthoughts•If you reverse the polarity of a fire-alarm, you get a fire-starter.
13·3 days agoI’m no electrician, but attaching the hot and neutral wires of an end appliance to the opposite wires of the power supply shouldn’t be a problem on a lot of bare bone, electromechanical hardware that don’t have logic units. Please correct and enlighten me, if you’re more knowledgeable! :D
durinn@programming.devto
Transfem@lemmy.blahaj.zone•I really like this dress, but I feel like something’s missing. Any tips on how to style it? (There’s another photo in the post)English
9·3 days agoI’d say, because of/thanks to the intricate pattern, which also contains multiple colors, it does work great on its own too. :) However! From a distance, it could give a dark-ish impression, so how about giving it some “accent” with a colorful - single color, mind you - accessory? A belt, a ribbon, a choker (yes, I’m from that era :D)? I’m a sucker for red ribbons myself. 😆












VLC