[-] jwt@programming.dev 8 points 21 hours ago

"Well gee looky here, you seem to be suspiciously well versed in 'aircraft cabin screwdrivery' usage"

[-] jwt@programming.dev 10 points 2 days ago

If you're specifically not doing it for the orgasm, it actually might be gay in a latent kind of way.

[-] jwt@programming.dev 9 points 5 days ago

And they're red, that means the offer is about to expire. Better act quick!

[-] jwt@programming.dev 5 points 6 days ago* (last edited 6 days ago)

I always took crickets coming out of the political arena to be a positive. I want my politicians to shut the fuck up and govern, thank you very much.

[-] jwt@programming.dev 67 points 3 weeks ago
[-] jwt@programming.dev 51 points 5 months ago

Transcend Wifi SD Card ~~Is~~ Was A Tiny Linux Server.

8 years ago, this article is from 2016. I wonder what progress was made if any, both security wise and performance wise.

[-] jwt@programming.dev 49 points 6 months ago

That would've made her look stupid, hadn't she already been racewalking.

[-] jwt@programming.dev 52 points 6 months ago

Bunch of old dudes dying while using a notoriously risky mode of transportation in bad weather over tricky terrain, while the only thing pointing to Israel thus far is motive. I'd say low.

[-] jwt@programming.dev 62 points 10 months ago

It's like naming your company x

71
submitted 11 months ago* (last edited 11 months ago) by jwt@programming.dev to c/worldnews@lemmy.world

In 2008, a Dutchman played a crucial role in the United States and Israeli-led operation to sabotage Iran’s nuclear program. The then 36-year-old Erik van Sabben infiltrated an Iranian nuclear complex and released the infamous Stuxnet virus, paralyzing the country’s nuclear program. The AIVD recruited the man, but Dutch politicians knew nothing about the operation, the Volkskrant reports after investigating the sabotage for two years.

Dutch source: https://nos.nl/artikel/2504114-nederlander-saboteerde-atoomcomplex-in-iran-den-haag-wist-niets

[-] jwt@programming.dev 71 points 1 year ago

Probably, from what I can see the address in question isn't really that exotic. but an email regex that validates 100% correctly is near impossible. And then you still don't know if the email address actually exists.

I'd just take the user at their word and send an email with an activation link to the address that was supplied. If the address is invalid, the mail won't get delivered. No harm done.

[-] jwt@programming.dev 43 points 1 year ago

Sponsored by 3M. Cool, so now they can give the soap to all people living near their PFAS plants.

view more: next ›

jwt

joined 1 year ago