Welcome to Incremental Social! Learn more about this project here!
Check out lemmyverse to find more communities to join from here!

AndrasKrigare

@AndrasKrigare@beehaw.org

This profile is from a federated server and may be incomplete. Browse more on the original instance.

AndrasKrigare ,

Huh... Will this message then get re-ingested by chatgpt? Did it just poison itself?

AndrasKrigare ,

You have to be O+, O-, A-, or B- to do power red https://www.redcrossblood.org/donate-blood/how-to-donate/types-of-blood-donations/power-red-donation.html

Or, put a different way, you can't be A+, B+, AB+ or AB-. I'm O+ and have done power red.

AndrasKrigare ,

Not sure if you're making a joke, but windows kill birds because they're transparent and birds fly into them not realizing it's there. The rest of the building doesn't really kill birds because they won't fly into it.

AndrasKrigare ,

Pedantic point: it's anti-materiEl, not anti-materiAl. Materiel in a military context refers to hardware, such as vehicles.

AndrasKrigare ,

Huh, I never knew there was no middle ground between hating on something and liking it. TIL

AndrasKrigare ,

If you don't want to spend as much time waiting for things to uncompress. Or if you want your compressed files to be smaller (and also compress faster).

AndrasKrigare ,

The overview is even more explicit

The book is a realistic yet fantastical story about a mouse-like human boy named Stuart Little.

AndrasKrigare ,

Rule of Acquisition number 102: Nature decays, but latinum lasts forever

‘Significant security loophole’ found in Google software container system (therecord.media)

The issue affected Google Kubernetes Engine (GKE), a system used to deploy, scale and manage how applications are “containerized.” GKE — the tech giant’s implementation of the open-source Kubernetes project — is used widely in healthcare, education, retail and financial services for data processing as well as...

AndrasKrigare ,

misconfigured

Makes me skeptical this is a real "loophole"

The issue revolves around permissions, with GKE allowing users access to the system with any valid Google account. Orca Security said this creates a “significant security loophole when administrators decide to bind this group with overly permissive roles.”

Orca Security noted that Google considers this to be “intended behavior” because in the end, this is an assigned permission vulnerability that can be prevented by the user. Customers are responsible for the access controls they configure.

The researchers backed Google’s assessment that organizations should “take responsibility and not deploy their assets and permissions in a way that carries security risks and vulnerabilities.”

Yeah, PEBKAC

AndrasKrigare ,

That's not true. If you're intentionally logged in to a website, sure, but tracking without an account requires action on the part of your browser, assuming you're using a VPN. Cookies, ad-IDs, user agent, preferred language, etc. is all information that the browser can decide if it provides or not.

AndrasKrigare ,

Could you explain to me how "if someone wants to use my work, they should pay me for it" could be perceived as racketeering, let alone "textbook?"

AndrasKrigare ,

"The work or service provided for free?" If so what's the difference? If you're getting something for free you have no right to complain

AndrasKrigare ,

Death does not diminish; the ghost gilds with glory.

Blessed are we who serve the Almsivi

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • incremental_games
  • meta
  • All magazines