c_ezra_m

joined 1 year ago
[–] [email protected] 3 points 6 months ago (1 children)

I do not understand why would a developer (or development team) change the licensing terms of their software for something stricter, like Redis did. Could someone tell me what the factors are?

[–] [email protected] 10 points 6 months ago

Yeah right. The name literally reads "sue you". So funny.

[–] [email protected] 6 points 7 months ago

If you don't pay for WinRAR, the only thing it will do is show up notices to buy it. This is intentional, meant to prevent piracy. So it's more like a donation rather than a purchase.

[–] [email protected] 6 points 9 months ago (1 children)

It's good to learn about some cultural differences, for both me and you. In Poland, Santa is believed to bring the naughty kids bundles of rods (as in, leafless twigs). We call that "rózga", even though the same word can just refer to a single rod as well.

[–] [email protected] 11 points 11 months ago (1 children)

This just goes to show you that Google will do anything for money.

[–] [email protected] 0 points 1 year ago

Only those energy drinks that have artificially added caffeine or taurine are going to have their sales restricted to those over 18.

[–] [email protected] 1 points 1 year ago

The API pricing was imposed to crack down on free training of LLMs with user data.

There were also other API changes like totally removing access to content marked as mature. I don't know if subreddits can disable setting a post as mature because automods can't detect it or see its content.

[–] [email protected] 4 points 1 year ago

Pokémon FireRed

[–] [email protected] 1 points 1 year ago

Seems really scary against the Internet as we know it. Saying that also because the word "kosa" means "scythe" in my language.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

Passwords are a very simple system that has been used since antiquity, its distribution in the Roman military having been described by Polybius.

Passwords found use in early computing. The Compatible Time-Sharing System (CTSS) developed at MIT in 1961 implemented a PASSWORD command, which only hid the characters to be typed.

The notion of hashing passwords was created in the early 1970s by Robert Morris. He also invented the crypt(3) algorithm, which used a 12-bit salt and invoked a modified form of the Data Encryption Standard (DES) algorithm 25 times to reduce risk of pre-computed dictionary attacks.

The ease of implementation is why password-based authentication is used everywhere. But I might argue this is too simple and can be exploited by attackers. Year after year, a new hashing algorithm becomes considered not secure enough.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago)

Okay, so Apple still has some time to think about the design of a phone with a replaceable battery because they haven't released one yet.

The main reason batteries couldn't be replaced in newer phones is because that made designers of the internals not care about the battery's shape, which meant they could insert more good tech inside. The battery normally had to be rectangular for easy insertion/removal. Even though this was the real main intent, manufacturers started capitalizing on this.

view more: next ›