[-] c_ezra_m@lemm.ee 3 points 5 months ago

I do not understand why would a developer (or development team) change the licensing terms of their software for something stricter, like Redis did. Could someone tell me what the factors are?

[-] c_ezra_m@lemm.ee 11 points 6 months ago

Yeah right. The name literally reads "sue you". So funny.

[-] c_ezra_m@lemm.ee 6 points 6 months ago

If you don't pay for WinRAR, the only thing it will do is show up notices to buy it. This is intentional, meant to prevent piracy. So it's more like a donation rather than a purchase.

[-] c_ezra_m@lemm.ee 6 points 9 months ago

It's good to learn about some cultural differences, for both me and you. In Poland, Santa is believed to bring the naughty kids bundles of rods (as in, leafless twigs). We call that "rózga", even though the same word can just refer to a single rod as well.

[-] c_ezra_m@lemm.ee 3 points 11 months ago

Lately, I've been seeing a lot of trucks in my country have a "dead angles" sticker that shows something similar.

[-] c_ezra_m@lemm.ee 11 points 11 months ago

This just goes to show you that Google will do anything for money.

[-] c_ezra_m@lemm.ee 1 points 1 year ago

The API pricing was imposed to crack down on free training of LLMs with user data.

There were also other API changes like totally removing access to content marked as mature. I don't know if subreddits can disable setting a post as mature because automods can't detect it or see its content.

[-] c_ezra_m@lemm.ee 4 points 1 year ago

Pokémon FireRed

8
submitted 1 year ago by c_ezra_m@lemm.ee to c/gamemusic@lemm.ee
[-] c_ezra_m@lemm.ee 2 points 1 year ago

Seems really scary against the Internet as we know it. Saying that also because the word "kosa" means "scythe" in my language.

[-] c_ezra_m@lemm.ee 2 points 1 year ago* (last edited 1 year ago)

Passwords are a very simple system that has been used since antiquity, its distribution in the Roman military having been described by Polybius.

Passwords found use in early computing. The Compatible Time-Sharing System (CTSS) developed at MIT in 1961 implemented a PASSWORD command, which only hid the characters to be typed.

The notion of hashing passwords was created in the early 1970s by Robert Morris. He also invented the crypt(3) algorithm, which used a 12-bit salt and invoked a modified form of the Data Encryption Standard (DES) algorithm 25 times to reduce risk of pre-computed dictionary attacks.

The ease of implementation is why password-based authentication is used everywhere. But I might argue this is too simple and can be exploited by attackers. Year after year, a new hashing algorithm becomes considered not secure enough.

[-] c_ezra_m@lemm.ee 1 points 1 year ago* (last edited 1 year ago)

Okay, so Apple still has some time to think about the design of a phone with a replaceable battery because they haven't released one yet.

The main reason batteries couldn't be replaced in newer phones is because that made designers of the internals not care about the battery's shape, which meant they could insert more good tech inside. The battery normally had to be rectangular for easy insertion/removal. Even though this was the real main intent, manufacturers started capitalizing on this.

[-] c_ezra_m@lemm.ee 1 points 1 year ago

Unfortunately, only Europe. Because manufacturers still want to capitalize on those "not easily removable" batteries in the rest of the world.

view more: next ›

c_ezra_m

joined 1 year ago