

That is so painfully accurate.
That is so painfully accurate.
No, Cheney, Rumsfeld, Powell, Rice, and a bunch of others in the administration championed it. Biden et al supported it. Subtle.
The whole album is a treat. It’s best enjoyed knowing the history of frank zappa’s various run-ins with the police due to his music
Yeah, I mistyped. But that would work too lol!
I had this same problem trying to remember the name of Revel Rouser by Duane Eddy last weekend. Another instrumental. Tried explaining instruments, style, and did the vocalization thing like in the post (there’s a name for it, but can’t remember: anomonopea?) 5 rounds of refinement led to a bunch of cool wrong answers. Ddg found a site that I could hum the tune to, but it returned an “API Fail” error. A brief search to find song-identifying resources sent me to Google voice search, and although it was only a 19% match, (probably my lousy pitch) I was finally able to get rid of that nagging brain worm.
Not the Kennedy Jr. kind…
Zoe, Inara, Kaylee, and River. Mic drop.
Well, not that shocked.
I manage the IT for a SMB in the non-profit mental health space, and am connected through another role to our state’s cybersecurity fusion center. My small, insignificant network has scanning attempts run on it a few thousand times a day. Several hundred times a day we will log attacks from various vectors. Looking at the stats every month, going back a decade, the source of all of these is: #1) Russia, #2) China. Every. Time. We present a fat ransomware target, but have no IP to steal, so why the interest? A couple of reasons, courtesy of the fusion center and the local FBI office: first, supply chain attacks: we are partnered with larger medical groups, insurance companies, the state government, and research universities, and using trusted connections to get into those upstream entities is sometimes easier than attacking the front door. I have a small security budget comparatively. Second: botnets/zombies: taking over systems from within the US and making your traffic domestic, or even local to your target helps obfuscate the source of the attack, and ultimately why everyone should care. Not just about China, but about security in general - unpatched home PCs have been used to host and distribute malware, spam and even CP. I certainly wouldn’t want that on my home network. Even if someone didn’t care about that, Americans can be trusted to fall back on: “they’re taking something of yours” - they’re using your bandwidth and you’re paying for it. I believe the Chinese citizens just want the same things American, German, Bulgarian, and East Elbonian citizens want - to live life and be happy (in our parlance; “Life, liberty, and the pursuit of happiness”). But the Chinese government however, has a 100-year plan to be the sole economic power in the world, and the way they’re trying to get there isn’t playing nicely in the sandbox.
Oh, shit, I’m still here… Can I have my wallet and dog back please?!?
OK, I’ve been dicking around with LibreTube for 4 hours now and I can’t figure out how to, or if I need to, create a login, and where exactly I would do that, given the several sources under “instance”.
For the sake of fuck, why are so many open source projects gut-wrenchingly awful at providing any beginner user info?
Great Scott! I was so busy packing, I forgot about the dog! Quick! What are your rates! Nevermind - here’s my bank info - I won’t need money anymore!!
Oh, shit! Who will water my plants?!
Wouldn’t say I buy cheap shit, not Apple (I’m not Musk or Bezos rich), but flagship Samsung and pro earbuds, Logitech trackball, jbl speakers, and headsets from Bose and Jabra. Now the BT receiver for the stereo, that was cheap Amazon garbage. I’ll give you that one.
I’m talking phones to cars (for hands-free and music), mice to desk and laptop, earbuds and headphones to both, keyboards to anything from computers to fire TVs, BT speakers, adapters for older receivers… They all suck. Multiple phones, devices and cars. (although the 2012 Chrysler was the worst so far, and the 2021 Subaru is better)
I will die on the hill that Bluetooth always has and always will suck ass. Pairing sucks. Latency sucks. Random-ass disconnects suck. Fuck Bluetooth in the neck sideways with a rusty screwdriver.
Same thing we do with .local - “click here to proceed (unsafe)” :D
Set up my work’s network waay back on NT4. 0 as .local cuz I was learning and didn’t know any better, has been that way ever since.
I remembered… poorly.
I’m looking into the possibility of moving my organization to FF. Office of about 200 endpoints. The sticky wicket that I don’t fully understand is Auth passthru to 365.
Is it by the same author? Nik Rols, iirc?
I’ve encountered a few sites that restricted repeating or sequential characters. Of course told after failing the first creation attempt. Makes things like randomly generated passphrases fun to figure out. Particularly when their idea of “sequential” involves both in alpha/numerical order, but also adjacent spacing on the (assumed?) qwerty keyboard!