Kazumara

joined 1 year ago
[–] Kazumara@discuss.tchncs.de 6 points 2 months ago

Claim Musk is a dangerous foreign influence and force a sale like for Tiktok

[–] Kazumara@discuss.tchncs.de 2 points 2 months ago

though you’d need to supply power

Go for really old ones with the crank handle for ringing. Like from army surplus and you don't need the power :-)

We played around with these for a day in the army https://en.wikipedia.org/wiki/Feldtelefon_50 when you crank the handle while your friend is still putting down the line you can shock them.

[–] Kazumara@discuss.tchncs.de 9 points 2 months ago

6 arc seconds, not a very well rounded individual

[–] Kazumara@discuss.tchncs.de 6 points 2 months ago

Friend of mine had the same scenario in high school. The only one who knew was the twin sister of the girlfriend. The rest of the family would never have accepted a non-muslim. It's probably the only way to do this until she's an adult and can tell them to fuck off.

[–] Kazumara@discuss.tchncs.de 5 points 2 months ago* (last edited 2 months ago)

Pre-UEFI they were fighting over the boot sector, sure, but now that everything is more well defined, and every OS can read the FAT32 ESP? Never seen it...

At worst the UEFI boot entry is replaced. There are some really shitty UEFI implementations out there which only want to load \efi\microsoft\boot\bootx64.efi or \efi\boot\bootx64.efi, or keep resetting you back to those.

Assuming you were dumped into Windows suddenly, you can check if you have the necessary boot entries still with bcdedit and its firmware option

bcdedit /enum firmware

If you just have a broken order you can fix it with

bcdedit /set {fwbootmgr} displayorder {<GUID>} /addfirst

If you actually need a new entry for Linux it's a bit more annyoing, you need to copy one of the windows entries, and then modify it.

bcdedit /copy {<GUID1>} /d "Fedora"
bcdedit /set {<GUID2>} path \EFI\FEDORA\SHIM.EFI
bcdedit /set {fwbootmgr} displayorder {<GUID2>} /addfirst

Where GUID1 is a suitable entry from windows, and GUID2 is the one you get back from the copy command as the identifier of the new entry. Of course you will have to adjust the description and the path according to your distro and where it puts its shim, or the grub efi, depending on which you'd like to start.

Edit: Using DiskGenius might be a little more comfortable.

[–] Kazumara@discuss.tchncs.de 4 points 2 months ago

I think that's what I must have looked like coming to the kitchen after that scene when I read Winnetou III as a 12 year old.

[–] Kazumara@discuss.tchncs.de 30 points 2 months ago

I am not a computer science major, I studied linguistics.

We're not falling for your deceit, Noam Chomsky. You probably used some context-free grammar to hack the website.

[–] Kazumara@discuss.tchncs.de 10 points 2 months ago (1 children)

We have a handful of portraits of one, and hours of animated material of the other. Who do you think gets looked at more? If that survey was actually conducted that was a huge waste of time.

[–] Kazumara@discuss.tchncs.de 40 points 2 months ago (2 children)

it’s much easier to just substract 2 from 2000, “IIMM” duh!

For anyone wondering why this is wrong, there are two reasons:

  1. The roman numeral system only traditionally contains subtractions from the next higher five- and tenfold symbol. So you can subtract I from V and X, X from L and C, C from D and M

  2. The subtractions only generally allowed one symbol to be subtracted, with a few notable exceptions like XIIX for 18 and XXIIX for 28

[–] Kazumara@discuss.tchncs.de 55 points 2 months ago* (last edited 2 months ago) (4 children)

Given 4/6 x > 5/6 y therefore x > 5/4 y

Marty's Pizza must have been more than a quarter larger than Luis'. The kid is exactly right.

And the teacher is not flexible enough to engage outside their expectations for how the question was supposed to be answered.

Clearly the expectation was for the kids to take the unstated assumption that the two pizzas were of the same size, and reject the premise as unreasonable (note the heading "Reasonableness").

[–] Kazumara@discuss.tchncs.de 1 points 2 months ago* (last edited 2 months ago)

Okay good. I thought it would, just didn't know any specifically. I wasn't trying to suggest a public blockchain would be the only solution or even the best of multiple solutions, only that they needed to consider more angles beyond just making a hash.

[–] Kazumara@discuss.tchncs.de 7 points 2 months ago

Best to do both, really, so a record of using a consistent public key is created.

Then supply chain attacks might be noticed. If someone manages to replace the file on the webserver but can't get to the signing key you've prevented the attack.

view more: ‹ prev next ›