I’m not sure, but I think that might have been part of the joke, seeing all the comments here.
I’m not sure, but I think that might have been part of the joke, seeing all the comments here.
It can be found here for anyone wondering: http://loginzlib2vrak5zzpcocc3ouizykn6k5qecgj2tzlnab5wcbqhembyd.onion/ and here: http://zlibrary24tuxziyiyfr7zd46ytefdqbqd2axkmxm4o5374ptpc52fad.onion/
I don’t have a clearnet link since the mirror I’ve been using appears to have been seized, but the onion link should be the most reliable way to access the z-library.
Thanks for the warning.
You can also do git diff --cached
to see all changes you added to the index.
If you have a fever.
deleted by creator
Is there any situation where you’d want to remember the opcodes? Disassemblers should give you user-friendly assembly code, without any need to look at the raw numbers. Maybe it’s useful to remember which instructions are pseudo instructions (so you know stuff like jz
(jump if zero) being the same as je
(jump if equal) making it easier to understand the disassembly), but I don’t think you need to remember the opcode numbers for that.
Edit: Maybe with malware analysis where the malware in question may be obfuscated in interesting ways to make the job of binary analysis harder?
What do leaf blowers do that rakes don’t? I don’t remember the last time I saw or heard a leaf blower.
they break with monospacedness
The IDEs I’ve used had the ligatures be of the same character width as the original operator.
Why are you casting to void*
? How is the compiler supposed to know the size of the data you are dereferencing?
Due to its reduced instruction set; it uses less power in general
If that is true I don’t think it can be attributed to it being RISC
(pretty sure they are talking about the scary book that is the Communist Manifesto, which is visible in the picture. I think it is about a ghost haunting Europe or something)
deleted by creator
I wonder what sort of mitigations we can take to prevent such kind of attacks, wherein someone contributes to an open-source project to gain trust and to ultimately work towards making users of that software vulnerable. Besides analyzing with bigger scrutiny other people’s contributions (as the article mentioned), I don’t see what else one could do. There are many ways vulnerabilities can be introduced and a lot of them are hard to spot (especially in C with stuff like undefined behavior and lack of modern safety features) , so I don’t think “being more careful” is going to be enough.
I imagine such attacks will become more common now, and that these kind of attacks could become very appealing for governments.
I wouldn’t trust ChatGPT with teaching me about some tool. It in my experience very convincingly spews out stuff it invented, and if one is still learning I can see it being hard to spot those errors. I use it to fix syntax errors in SQL queries, though, since I can’t be bothered to try understanding the not-so-helpful error messages I get with my queries, and because if chaptgpt tells a lie it will be caught by my syntax checker.
So, I guess you can use it, if you always assume it to be trying to mislead you until proven to the contrary.
Watt is the amount of water flowing out at the end
Shouldn’t it instead be the sum of the kinetic energy of all water molecules that come out the other end per unit of time (ie. total amount of energy you use move your volume of water with a certain pressure in a second)?
I never got the pipe analogy. Since liquid water can’t be compressed, wouldn’t the amperes be directly proportional to the volts and to the size of the pipe, assuming there are no air bubbles? Also, supposedly resistance only reduces current, but when I think of hair in a pipe, the pressure after the obstruction would also be lower (because pressure is directly proportional to the amount of water that flows)
Is xml really that unreadable for machines? I enjoy xml as a format, because I can generally just convert it to an s-expression and easily manipulate it as a tree.
German has the term raubkopieren for piracy which translated literally means theft-copying. I kind of find that term funny because somehow it makes it sound even worse than just piracy, since with pirates we at least have the pop fiction image of the pirate, and because it has a paradoxical sound to it (“how can you steal something by copying?”).