[-] SatyrSack@lemmy.sdf.org 31 points 21 hours ago

The first closest thing that comes to mind:

Screencheat is a ridiculous competitive split-screen first-person shooter where everyone is invisible, so players are forced to look at each other’s screens to win.

https://store.steampowered.com/app/301970/Screencheat/

[-] SatyrSack@lemmy.sdf.org 44 points 23 hours ago

>turn off anti-aliasing
>in-game nick gets replaced by my birthname

I get that this is a joke, but following the logic here, isn't that the exact opposite of what that would do?

[-] SatyrSack@lemmy.sdf.org 72 points 1 day ago

At least this is still you choosing when to update

[-] SatyrSack@lemmy.sdf.org 6 points 1 day ago

Lemmy seemed to parse that as two separate hyperlinks for me. This should work as a simple clickable link 🤞 https://web.archive.org/web/20240926051545/https://forum.makemkv.com/forum/viewtopic.php?f=16&t=19634

[-] SatyrSack@lemmy.sdf.org 2 points 3 days ago

ALL NIGHT LONG

1
Life of Benjamin (feddit.org)
[-] SatyrSack@lemmy.sdf.org 1 points 4 days ago

YOU GET ME CLOSER TO GOD

[-] SatyrSack@lemmy.sdf.org 2 points 4 days ago

!connectasong@lemmy.world once had a full 24+ hours of nothing but posts involving the word "creep"

[-] SatyrSack@lemmy.sdf.org 1 points 6 days ago

It doesn't make sense. I understand it, but it doesn't make sense.

[-] SatyrSack@lemmy.sdf.org 1 points 6 days ago

Are you just referring to how Python uses the English and/or instead of the more common &&/||? I think what the user above you was talking about was Lua's strange ternary syntax using and/or.

4
Fully functional (lemmy.sdf.org)
66
[-] SatyrSack@lemmy.sdf.org 57 points 2 weeks ago

Yes, this particular incident.

https://en.wikipedia.org/wiki/XZ_Utils_backdoor

In February 2024, a malicious backdoor was introduced to the Linux build of the xz utility within the liblzma library in versions 5.6.0 and 5.6.1 by an account using the name "Jia Tan".[b][4] The backdoor gives an attacker who possesses a specific Ed448 private key remote code execution through OpenSSH on the affected Linux system. The issue has been given the Common Vulnerabilities and Exposures number CVE-2024-3094 and has been assigned a CVSS score of 10.0, the highest possible score.[5]

Microsoft employee and PostgreSQL developer Andres Freund reported the backdoor after investigating a performance regression in Debian Sid.[8] Freund noticed that SSH connections were generating an unexpectedly high amount of CPU usage as well as causing errors in Valgrind,[9] a memory debugging tool.[10]

[-] SatyrSack@lemmy.sdf.org 324 points 2 weeks ago

Immediately get noticed

Realistically, though, we are only aware of that one because it was noticed in that unlikely scenario and then widely reported. For all we know, most open source backdoors are alive and well in our computers, having gone unnoticed for years.

4

Contains a Babylon 5 spoiler

3
AAAAH I KNEW IT! (feddit.org)

DIS S5E5 "Mirrors"

https://arresteddevelopment.fandom.com/wiki/Gene_Parmesan

Gene Parmesan is a private detective [...] Gene was hired by Lucille [...] He has a habit of showing up to meet her in disguises, which never fails to delight Lucille.

30

In comment sections or in community pages, it's mostly an ocean of default avatars. Why do you choose to stand out with a custom avatar on this semi-anonymous platform?

53
submitted 3 weeks ago* (last edited 3 weeks ago) by SatyrSack@lemmy.sdf.org to c/tenforward@lemmy.world
155
28

Airplane! (1980)

Inspired by this comment by @klu9@lemmy.ca: https://lemmy.ca/comment/16718586

69
submitted 3 weeks ago* (last edited 3 weeks ago) by SatyrSack@lemmy.sdf.org to c/chevron7@lemmy.world

GIFs 1-10

GIFs 11-20

GIFs 21-30

GIFs 31-40

GIFs 41-50

GIFs 51-54

9

Always Sunny S5E5 "The Waitress is Getting Married"
ENT S3E16 "Doctor's Orders"

204

Babylon 5 S1E1 "Midnight on the Firing Line"


Community S6E7 "Advanced Safety Features"


Dark Matter S1E1 "Pilot - Part 1"


The X-Files S2E6 "Ascension"

view more: next ›

SatyrSack

joined 5 months ago