[-] [email protected] 3 points 6 months ago

I do not understand why would a developer (or development team) change the licensing terms of their software for something stricter, like Redis did. Could someone tell me what the factors are?

[-] [email protected] 11 points 6 months ago

Yeah right. The name literally reads "sue you". So funny.

[-] [email protected] 6 points 6 months ago

If you don't pay for WinRAR, the only thing it will do is show up notices to buy it. This is intentional, meant to prevent piracy. So it's more like a donation rather than a purchase.

[-] [email protected] 6 points 9 months ago

It's good to learn about some cultural differences, for both me and you. In Poland, Santa is believed to bring the naughty kids bundles of rods (as in, leafless twigs). We call that "rózga", even though the same word can just refer to a single rod as well.

[-] [email protected] 3 points 11 months ago

Lately, I've been seeing a lot of trucks in my country have a "dead angles" sticker that shows something similar.

[-] [email protected] 11 points 11 months ago

This just goes to show you that Google will do anything for money.

[-] [email protected] 4 points 1 year ago

Pokémon FireRed

8
submitted 1 year ago by [email protected] to c/[email protected]
[-] [email protected] 2 points 1 year ago

Seems really scary against the Internet as we know it. Saying that also because the word "kosa" means "scythe" in my language.

[-] [email protected] 2 points 1 year ago* (last edited 1 year ago)

Passwords are a very simple system that has been used since antiquity, its distribution in the Roman military having been described by Polybius.

Passwords found use in early computing. The Compatible Time-Sharing System (CTSS) developed at MIT in 1961 implemented a PASSWORD command, which only hid the characters to be typed.

The notion of hashing passwords was created in the early 1970s by Robert Morris. He also invented the crypt(3) algorithm, which used a 12-bit salt and invoked a modified form of the Data Encryption Standard (DES) algorithm 25 times to reduce risk of pre-computed dictionary attacks.

The ease of implementation is why password-based authentication is used everywhere. But I might argue this is too simple and can be exploited by attackers. Year after year, a new hashing algorithm becomes considered not secure enough.

[-] [email protected] 1 points 1 year ago* (last edited 1 year ago)

Okay, so Apple still has some time to think about the design of a phone with a replaceable battery because they haven't released one yet.

The main reason batteries couldn't be replaced in newer phones is because that made designers of the internals not care about the battery's shape, which meant they could insert more good tech inside. The battery normally had to be rectangular for easy insertion/removal. Even though this was the real main intent, manufacturers started capitalizing on this.

[-] [email protected] 2 points 1 year ago

I'm pretty sure that, under the hood, they become evil towards their users and don't change from that. And will never reconsider rescinding the things we're grateful to not have in the fediverse: profits fueled by advertising rather than donations, tracking sensitive information (including that one can and will use against you), selling that information, and obscure, closed algorithms.

But what you said may be right. Those goddamn C&D orders backed by powerful lawyers...

[-] [email protected] 3 points 1 year ago

Same here! Though my Reddit escape is going to be slow, it's sure.

view more: next ›

c_ezra_m

joined 1 year ago