- 6 Posts
- 25 Comments
Cute dogs allowed!
You definitely don’t want this stuff to escape into the atmosphere.
Elephant0991@lemmy.bleh.auto Technology@beehaw.org•Two brands suspend advertising on X after their ads appeared next to pro-Nazi contentEnglish51·2 years agoSpokespeople for NCTA and pharmaceutical company Gilead said that they immediately paused their ad spending on X after CNN flagged their ads on the pro-Nazi account.
Alt-speak: we only care if the media report that our ad placements were next to questionable contents.
At least you did post an excellent meme because of the painful, terrible event.
Elephant0991@lemmy.bleh.auOPto Technology@beehaw.org•You can make top LLMs break their own rules with gibberishEnglish3·2 years agoYeah, some source say that the raised examples have been fixed by the different LLMs since exposure. The problem is algorithmic, so if you can follow the research, you may be able to come up with other strings that cause a problem.
Elephant0991@lemmy.bleh.auOPto Technology@beehaw.org•You can make top LLMs break their own rules with gibberishEnglish1·2 years agoThere did seem to be a controversy in March about whether or not the word should go.
Elephant0991@lemmy.bleh.auOPto Technology@beehaw.org•[Corp Blog] Facial recognition tech lands innocent woman with bogus carjacking chargeEnglish4·2 years agoHaha, if you quickly skipped the “and people” part. Happen all the time. Brain cycles are expensive.
Elephant0991@lemmy.bleh.auto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Download managersEnglish1·2 years agodeleted by creator
Elephant0991@lemmy.bleh.auOPto Technology@beehaw.org•[Corp Blog] AnonAddy has rebranded as addy.ioEnglish7·2 years agoOK. Info added.
addy.io is a privacy-focused email service that allows you to create and manage email aliases…
Elephant0991@lemmy.bleh.auOPto Technology@beehaw.org•[Corp Blog] Twitter Blue to X Phishing Breakout – Gridinsoft BlogsEnglish2·2 years agoYou’re right. Edited.
Easy excuse; anyone would believe it. It’s the work of God.
- Yes, if it disconnected and is unable to sync, you can still access the vault.
- If you change the master password elsewhere, when your app is able to sync, it will log out automatically.
Ideally, since you want to write your master password down to keep it safe somewhere (because you can forget), you write the new password down before you change the password.
I just want a native experience.
Elephant0991@lemmy.bleh.auto Technology@beehaw.org•Early adopters in Mexico lend their eyes to global biometric projectEnglish27·2 years agoBiometrics data that can’t be changed in the control of questionable corporations? No way. It’s gonna be sort of like Reddit: your data is our property, and in this case, it looks like they actually give you minimally in exchange.
Elephant0991@lemmy.bleh.auto Technology@beehaw.org•Researchers strengthen defenses against denial-of-service attackEnglish6·2 years agoSummary
- Scientists at the Department of Energy’s Pacific Northwest National Laboratory have developed a new way to detect denial-of-service attacks.
- The new technique is more accurate than current methods, correctly identifying 99% of attacks in testing.
- The technique works by tracking the evolution of entropy, a measure of disorder in a system.
- During a denial-of-service attack, two measures of entropy go in opposite directions. At the target address, many more clicks than usual are going to one place, a state of low entropy. But the sources of those clicks, whether people, zombies or bots, originate in many different places—high entropy. The mismatch could signify an attack.
- The new technique is automated and doesn’t require close oversight by a human to distinguish between legitimate traffic and an attack.
- The researchers say that their program is “lightweight”—it doesn’t need much computing power or network resources to do its job.
- The PNNL team is now looking at how the buildout of 5G networking and the booming internet of things landscape will have an impact on denial-of-service attacks.
Yes! There is this Buddhist saying, supposedly some 2,500 years back, “Even if a whole mountain were made of gold, not double that would be enough to satisfy one person.”
You can trace unsatisfied greed in American gazillionaires all the way back to Rockefeller. Before that, you can trace it to Kings, Queens, Emperors, Conquerors. Only external circumstances, societal structures/cultures/etc, keep the greed in check. As soon as we were out of subsistence living, we started collecting, often times just for the sake of collections, sometimes other people’s great misery be damned.