🎲 Role player, Game master.
So we’re trying to make Talos a thing?
deleted by creator
My guess is for the streamers who want to wander about streets or in other public places. Then they don’t have to have a snatchable camera in their hands, as the watch is at least tethered to their arm.
Pro tip: whichever arm you wear your watch on, wipe with the other hand.
Well, that’s disappointing to learn.
“Wick started his talk by saying that it looks like everything is great with the Flatpak project, but if one looks deeper, “you will notice that it’s not being actively developed anymore”. There are people who maintain the code base and fix security issues, for example, but “bigger changes are not really happening anymore”. He said that there are a bunch of merge requests for new features, but no one feels responsible for reviewing them, and that is kind of problematic.”
–OOF.
deleted by creator
Reviewers can get it wrong, too. Here’s a review of Empire Strikes Back from June 15, 1980
https://archive.nytimes.com/www.nytimes.com/library/film/061580empire.html
Confession: When I went to see “The Empire Strikes Back” I found myself glancing at my watch almost as often as I did when I was sitting through a truly terrible movie called “The Island.”
You can only go so far back, and then it won’t let you edit older posts. I tried many months ago.
I can’t prove you wrong, but your post made me wonder this: Senator Ted Stevens in 2006, said that “the Internet is a series of tubes”. Every one of those tubes must have an end. The Anus is the end of a tube (the lower intestine). Therefore, the Internet is a series of anuses. Prove me wrong.
Dude gave anyone looking for forensic clues a layup
would lock every employee out of their accounts if his credentials were ever revoked, and named the code IsDLEnabledinAD, as in “Is Davis Lu enabled in Active Directory.”
That’s kind of an easy figure out: look for all the D.L.s in the company and work from there. But then
investigators subsequently found the source code for this program on an internal development server in Kentucky, and that Lu’s user account had been used to execute the malware on the production box. Lu was also the only member of his team who had access privileges for that dev machine.
This guy left an easy forensic trail.
It tells you, “DHS’s Cybersecurity and Infrastructure Security Agency (CISA) offers cybersecurity best practices for securing US networks.”
CISA workforce cut by nearly one-third so far
The agency has lost roughly 1,000 staffers in the wake of the Trump administration’s workforce cuts.
Source: https://www.cybersecuritydive.com/news/cisa-departures-trump-workforce-purge/749796/