

I do not think that even Elon has enough power at SpaceX to force them to design next-generation rockets using Large Language Models. Engineers know better than that. Their next rocket wouldn’t even make it off the pad.
I do not think that even Elon has enough power at SpaceX to force them to design next-generation rockets using Large Language Models. Engineers know better than that. Their next rocket wouldn’t even make it off the pad.
Yeah it’s not so much the infrastructure but the political alignment that raises an eyebrow here
Yeah, fuckin knew it the moment they announced this.
How long would it take to be considered an inactive memory page? Does OOM conditions immediately trigger compression, or would the process die first?
I bet we find out they cheated by fucking with voting machines in swing states someday. They sure do like to make little quips about it that they think only MAGA will understand.
Correct. Everyone knows this trick so everyone filters out the everything from the + to the @.
Even when email lists are “legitimately” sold it’s removed.
This guy’s using 1990s techniques in 2025.
“We can prosecute using IP address!”
Where is the hacktivism when you need it? These companies need to be gutted from the inside out.
Begin, the AI wars have.
This is a flex to potential investors to drum up interest on all the data they’re going to be able to categorize and sell.
BigMacHole is becoming KNOWN for being a PATROLIOTIC CHATTER and PROLIFIC SUPPORTER of the current administration! The way JESUS and BBQ want it!!!
Linux doesn’t work on TV
proceeds to name 3 distros that not only work but do gaming
My brother in Christ…
Yeah but they’re only taking the bad parts
On March 16th, 2013, America passed the American Inventors Act, which transitioned the United States to a First-to-File system.
Also, patents shouldn’t be filable once prior art exists.
Aka Nintendo patenting game mechanics 30 years after the fact to try and sue Palworld.
Also game mechanics and UI features being tied to existing functionality (Amazon’s “one click”, Apple’s “swipe to unlock”) should not be considered novel.
I had a double NAT setup like that. Run a firewall like OPNSense as a Proxmox VM, and give it a WAN interface on the ISP router’s IP range; then run everything else on a different subnet, using OPNSense as the gateway. On the ISP router, put OPNSense’s WAN IP in the DMZ. Then, do all your hardening using OPNSense’s firewall rules. Bonus points for setting up a VLAN on a physical switch to isolate the connection.
The ISP router will send everything to OPNSense’s WAN IP, and it will basically bypass the whole double NAT situation.
If electronics fall out of favor, it will be harder to profile and track us
That is absolutely not the reason ANYONE recommends it, unless you are a complete noob and entirely unfamiliar with computer security at all, and are just pulling assumptions out of your ass. Don’t fucking do that, don’t post with confidence when you’re just making shit up because you think you know better. Because you don’t.
If there is a vulnerability in SSH (and it’s happened before), attackers could use that to get into root directly, quickly, and easily. It’s an instant own.
If root login is disabled, it’s way less likely that whatever bug it is ALSO allows them to bypass root login being disabled. Now they have to yeah, find a user account, compromise that, try to key log or session hijack or whatever they set up, be successful, and elevate to root. That’s WAY more work, way more time to detect, to install patches.
If the effort is higher, then this kind of attack isn’t going to be used to own small fry servers; it’s only be worth it for bigger targets, even if they’re more well protected.
If you leave root enabled, you’re already burnt. You’re already a bot in the DDoS network.
And why? You couldn’t be bothered to type one extra command in your terminal? One extra word at the start of each command?
Sorry bitch, eat your fucking vegetables
This is terrible advice.
“Just turn off your firewall bro, please bro, everyone just paranoid please bro enable remote root login bro 😢”
Then you can’t gain root privileges on your server. Are you really arguing for less security because it’s inconvenient?
This is end-user behavior and it’s honestly embarrassing. You should realize your security posture is much more important than “I left my phone on the other room”
Generic models are not ready yet and won’t ever be but my company is using something from AWS called “Q” I think (heh, great name this day in age) but because it performs training rounds (*I think!) on a set of documents you define (like process documentation) its actually pretty good at finding exactly the information and suggesting additional reading. We’re using it on a process guide of a couple hundred pages; not sure how it scales to other sizes or what the cost is.