It would basically let you see all the hidden characters that indicate formatting, which made it possible to see why your text would suddenly display in a weird way.
It would basically let you see all the hidden characters that indicate formatting, which made it possible to see why your text would suddenly display in a weird way.
It’s a reference to your username
Yup, my Lemur has completely lost one hinge; I’ve actually got the case duct taped together at this point. Their customer support was really bad when i contacted them about it; they tried to get me to agree to charges before they even told me what they were charging me for: it took me days of escalation to get the answer that they were going to ship me a part but had no instructions or videos for installation and didn’t recommend end users do it. I’m actually looking at Framework now instead; I’m pretty done with System 76 at this point.
Sure, but to me that means the latest information is that AI assistants help produce insecure code. If someone wants to perform a study with more recent models to show that’s no longer the case, I’ll revisit my opinion. Until then, I’m assuming that the study holds true. We can’t do security based on “it’s probably fine now.”
Pedantics fighting pedantics LOL
I think you mean “pedants fighting pedants” :p
As a cybersecurity guy, it’s things like this study, which said:
Overall, we find that participants who had access to an AI assistant based on OpenAI’s codex-davinci-002 model wrote significantly less secure code than those without access. Additionally, participants with access to an AI assistant were more likely to believe they wrote secure code than those without access to the AI assistant.
I absolutely agree that it can’t create finished content of any particular value. For my D&D use case, its value is instead as a brainstorming tool; it can churn out enough ideas quickly enough that it’s easy for me to find a couple of gems that I can polish up into something usable.
This is why my most frequent use of it is brainstorming scenarios for my D&D game: it’s really good at making up random bullshit.
Growing up I remember hearing that red cars were the most expensive for insurance, as owners of red cars had the highest incidence of speeding and dangerous driving.
Life doesn’t adhere to waterfall methodology: we don’t have to do one first, and then the other. We can progressively disarm as we’re addressing the problems you mentioned…
Not the person you’re asking, but my general understanding is that different products would be required to be their own companies, so advertising, Android, and Chrome would all be separate businesses.
Ah interesting, thanks!
Interesting! Sounds like they may have changed things a few times, or maybe my co-worker’s memory has some gaps.
A coworker of mine has worked with CrowdStrike in the past; I haven’t. He said that the releases he was familiar with from them in the past were all staged into groups and customers were encouraged to test internally before applying them; not sure if this is a different product or what, but it seems like a big step backwards of what he’s saying is right.
The tl;dr from the article (which is actually worth a read):
The very short version: Unix PIDs do start at 0! PID 0 just isn’t shown to userspace through traditional APIs. PID 0 starts the kernel, then retires to a quiet life of helping a bit with process scheduling and power management. Also the entire web is mostly wrong about PID 0, because of one sentence on Wikipedia from 16 years ago.
I love Localsend because it’s gloriously simple: Does exactly what you want, and nothing more. I haven’t used KDE Contact; what else does it add in?
If XSS is your concern, check out Firefox’s Container Tabs. They allow you to set up tab groups that restrict access to cookies to only tabs in that group, so you can just, eg, set up a group for your bank and restrict it to just your bank’s site. Your session cookie etc are then not available to any other tab groups.
I pair that with the Temporary Containers extension, so any random tab I open is in its own container. Everything is always separate.
Hardware controls are meaningless if an attacker gets you to click on a dodgy link in a phishing email or you fall for a social engineering scam when “Microsoft” calls you because your computer has a virus.
Two of the employees were twins. It wasn’t planned, but it did give us a chance to see if twins were a weak point.
No, it gave you a chance to see if that particular set of twins was a weak point.
I’ve found the $5 a month tier to be just about right. There have been a few months I’ve gone over, but they make that super easy to deal with: they just change the subscription renewal date and you start your next month a few days early.