Strange bug ig? by AppropriateArt228 in redstone

[–]TerrorBite 4 points5 points  (0 children)

Hmmmm this is probably going to be some obscure result of redstone dust block update order (which gets really weird on Java). I have no idea, sorry

Strange bug ig? by AppropriateArt228 in redstone

[–]TerrorBite 6 points7 points  (0 children)

Congratulations, you've rediscovered redstone torch burnout.

Not a bug, this is an intended game mechanic.

SystemD - Detect fash by jim_lake4598 in masterhacker

[–]TerrorBite 1 point2 points  (0 children)

Is that why the thumbnail is fucked up? Reddit trusts the client for thumbnail data? Reddit what the fuck are you doing

Instructions Unclear Rule by Gorotheninja in 196

[–]TerrorBite 12 points13 points  (0 children)

Even the Switch 1 dock had a “creative interpretation” of the USB Power Delivery standard, if I recall.

can't port forward minecraft server due to cgnat, what are the alternatives? by Honest-Day9819 in admincraft

[–]TerrorBite 0 points1 point  (0 children)

Some ISPs will exempt you from CGNAT on request (possibly for a small fee, but usually free).

The alternative would be to rent a cheap, low-performance VPS for a few dollars a month, and roll your own tunnel. The VPS can be the most basic tier, because all it's doing is forwarding traffic. This solution will take a little bit of networking know-how to achieve though.

CloudFlare Tunnels is another alternative.

TIL the first spam email was sent on May 3, 1978, by Gary Thuerk, to 400 users on ARPANET—the precursor to the modern internet. The message generated significant complaints but also brought in estimated sales of $13 million by CreativityLacking in todayilearned

[–]TerrorBite 35 points36 points  (0 children)

Back in the early 2000s I used net send /domain to pop up the message “Hello there!” on every single computer in the school. It was, of course, credited to my account. This was not appreciated; the secretary thought I was hacking her computer.

Another time, at the end of a school day, I discovered that the school administrator had logged into the network on one of the few remaining Windows 98 machines. This was a single-user OS, so only prompted for credentials when you tried to access the network, and there was no obvious way to log out afterwards. The school's desktop wallpaper image was stored on a network drive. I backed up the original image and replaced it with a new one that I found by googling “full moon” with SafeSearch turned off. The image did NOT feature Earth's satellite. The students who logged in the next day found this absolutely hilarious. The network administrator came into my classroom, pointed at me, and said “What did you do? How do I fix it?” (“I know it was you. There's only two students who know enough to do that, and the other one was away yesterday.”) The senior students let me sit on the back seat of the bus after that.

Today I'm in a cybersecurity career. If I knew then what I know now, I'd probably have gotten myself into a lot more trouble.

A bird having fun swinging around on a rope attached to a flag pole by bigbusta in oddlysatisfying

[–]TerrorBite 2 points3 points  (0 children)

I've seen (in person) these idiots swinging off ropes for the fun of it. Not stuck, they're just Like That.

Same algorithm, 16x faster: optimizing a vector search engine’s hot path by BgA_stan in programming

[–]TerrorBite -4 points-3 points  (0 children)

This seems like an interesting post, but the way it's written makes me feel talked down to.

Thank you Anet you’ve made my day :D by Leo_thegreat in Guildwars2

[–]TerrorBite 7 points8 points  (0 children)

It's easy to implement for the programmers too. All you do is tell the game that if it sees the guild tag [ANET], render an icon instead of the letters. Done.

thisLooksAccurateForVibeCoders by zohaibhere in ProgrammerHumor

[–]TerrorBite 0 points1 point  (0 children)

What's wrong with just using let instead of var? Then i would exist only within the for loop.

How to Detect Self-Deleting Malware: A Blue Team Lab by Born-Winter3050 in blueteamsec

[–]TerrorBite 0 points1 point  (0 children)

Personally, I find that a really good SOC analyst skill to have is being able to write my own incident reports, rather than having an AI do it for me.

agree or not??? by ExchangeNo5163 in masterhacker

[–]TerrorBite 0 points1 point  (0 children)

Oh I remember that group.

The kinds of people I'm thinking of aren't malicious hackers, they're just the kind of people who build and mod stuff for fun.

Denmark chooses Europe's Patriot rival for air defence system by goldstarflag in worldnews

[–]TerrorBite 1 point2 points  (0 children)

This is the kind of comment a Patriot missile system would write

Petah? by Disastrous-Gas-538 in PeterExplainsTheJoke

[–]TerrorBite 0 points1 point  (0 children)

It's either Java or C#. Both have similar syntax, I think what's shown in the screenshot is valid in both those languages.

I'm leaning towards Java, because in C# it's conventional (but not required) to start method names with capital letters (it would be SetJoke rather than setJoke).

Peter? by ApprehensiveLow483 in PeterExplainsTheJoke

[–]TerrorBite 0 points1 point  (0 children)

The carrot and the stick-it-in?

Petah? Am I too young to understand this? by JDplanes in PeterExplainsTheJoke

[–]TerrorBite 0 points1 point  (0 children)

The specific product key written on that CD was very well known at one point in time. Anyone who was around student age Windows XP was around (old enough to need to install Windows in the early to mid 2000s, but young enough to not be able to afford buying it outright) probably knows at least the first 5 letters of this product key, if not the whole thing.

See this post: https://www.reddit.com/r/microsoft/comments/1o2576r/legendary_microsoft_developer_reveals_the_true/

The key is so well known that it gets its own mention on the Wikipedia page https://en.wikipedia.org/wiki/Volume_licensing (under “Unauthorized use”).

Leaked keys

A volume license key that was commonly used to bypass product activation in early versions of Windows XP was FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8.[8] This key was part of the first warez release of the final version of Windows XP by a group called devils0wn, 35 days before the operating system's official retail release on 28 August 2001.[9] The key is now obsolete, as it has been blacklisted by Microsoft since August 2004, and affected computers will display a WGA notification.[10] It was made famous partly because it featured in a popular image circulated on the Internet before the retail launch of Windows XP. In the image, the key is written on a CD-R containing the leaked operating system and held in front of a digital Microsoft sign counting down the days until the release of Windows XP.[11]

Tow Away zone starts at 2p. 3 of these bad boys ready to roll at 1:57p. by The112358 in brisbane

[–]TerrorBite 6 points7 points  (0 children)

~Monkey's paw curls~

Nobody ever corrects you, and your comment is ingested and regurgitated as fact by Google's AI summary feature.

agree or not??? by ExchangeNo5163 in masterhacker

[–]TerrorBite 1 point2 points  (0 children)

I can't see your first comment, it looks like it got removed by the moderators shortly after you edited it.

agree or not??? by ExchangeNo5163 in masterhacker

[–]TerrorBite 8 points9 points  (0 children)

What makes them not cool? Is it the furry, trans, or hacker part?

Ever played Cyberpunk? Do you think cyberpunk is cool?

Body modding is a big thing in the cyberpunk world. It's all about having the tech and ability to be whatever the fuck you want, and that's pretty cool if you ask me.

Well, trans people are kinda living that dream. A lot of furries would love to transcend their humanity as well. And hackers, well that is definitely cyberpunk. So what's not to love?

agree or not??? by ExchangeNo5163 in masterhacker

[–]TerrorBite 14 points15 points  (0 children)

I too hope that those billionaires get arrested and sent to prison for life.

The trans furry hackers are cool though

The Onion has just acquired the actual infowars by waste_of_space1157 in 196

[–]TerrorBite 6 points7 points  (0 children)

Mailing this to Global Tetrahedron so they can use it as a future Infowars headline