
An error as small as a single flipped memory bit is all it takes to expose a private key.

Don't worry y'all, I'm an expert at interpreting chart data. What this tells us is that although you lose your childhood resilience over time, your wall-punching resilience increases from your teenage years through the rest of your life. By 70, you're guaranteed to be indestructible when it comes to wall punching.
Sometimes I'll be kinda zoned out and realize I just signaled because the road curved.
This reminds me of the time that I learned that the correct answer to "what's up?" is "what's up?" At least in the context of that one coworker who would say that to me as we were walking past each other.
I've since learned to recognize these things as a "bid for connection". It generally has little to do with the content of the question or the answer and everything to do with relating.
So basically there is no wrong answer. And there are lots of good examples in this thread!
Personally I tend to answer "not much" as a knee-jerk reaction, but sometimes I'll remember to say something else after that.
It is so weird to mention Monsanto in this headline.
The Individualist Party
I don't think your existence depended on your having sex with your wife...
I think you're still giving them too much credit with the for loop and regex and everything. I'm thinking they exported something to Excel, got 60k rows, then tried to add a lookup formula to them. Since you know, they don't use SQL. I've done ridiculous things like that in Excel, and it can get so busy that it slows down your whole computer, which I can imagine someone could interpret as their "hard drive overheating".
The post in the screen shot is dated February 14, 2025 though?
Is anyone else completely not surprised by DC's being "sub"?
Charlatan?
Uh, you're either supposed to complain about censoring or over-analyze the meme. What is this clever, amusing comment? Are you sure you're on the right site?
I get the joke, and certainly not all self-help books are good, but also people are unique and at different places in their lives. With just a little introspection one can probably tell which book would be better for them. Maybe they say yes too much and would benefit from learning how and when to say no; or they say no to everything and would benefit from learning to embrace new experiences.
Or, you know, pick one up and thumb through a few pages.
I'm good now, thanks 🙂
Hey bud it sounds like our experiences may have quite a bit of overlap. I think the #1 thing that helps here is learning to have and respect healthy boundaries. Internal and external boundaries allow you to have more fulfilling relationships and feel more fulfilled yourself. These are things that a lot of people kind of implicitly learn from their families, but we weren't so lucky. If you have the option and can find a good therapist, they can help you with this. Otherwise, there are a lot of good books about boundaries that you can probably get from your local library or Amazon.
That's what I did, still have some trouble with IRL relationships though.
It's 942822688476
I highly recommend reading the rest of the book. bell hooks acknowledges the roles that women play in inflicting the harms on boys and men. Reading that book was the most understood I had ever felt as a cis man who until then didn't really know what feminism was about.
I don't know what those flags mean, but from context I think this is a command I've needed a bunch of times but haven't had the time or energy to learn about yet. So thanks! I can't wait to try it!
It is ALWAYS "shut the fuck up" Friday.
I did, but then my family had this movie on VHS when I was younger and I've probably watched it like 100 times. It came on TV once when I was on the phone with my friend and I quoted all the lines just ahead of the TV. I bet that annoyed the shit out of her.
"In a first, cryptographic keys protecting SSH connections stolen in new attack"
An error as small as a single flipped memory bit is all it takes to expose a private key.
I read most of this article trying to determine if I was impacted, so to save you the trouble:
The researchers traced the keys they compromised to devices that used custom, closed-source SSH implementations that didn’t implement the countermeasures found in OpenSSH and other widely used open source code libraries.