>turn off anti-aliasing
>in-game nick gets replaced by my birthname
I get that this is a joke, but following the logic here, isn't that the exact opposite of what that would do?
>turn off anti-aliasing
>in-game nick gets replaced by my birthname
I get that this is a joke, but following the logic here, isn't that the exact opposite of what that would do?
At least this is still you choosing when to update
Lemmy seemed to parse that as two separate hyperlinks for me. This should work as a simple clickable link 🤞 https://web.archive.org/web/20240926051545/https://forum.makemkv.com/forum/viewtopic.php?f=16&t=19634
ALL NIGHT LONG
YOU GET ME CLOSER TO GOD
!connectasong@lemmy.world once had a full 24+ hours of nothing but posts involving the word "creep"
It doesn't make sense. I understand it, but it doesn't make sense.
Are you just referring to how Python uses the English and
/or
instead of the more common &&
/||
? I think what the user above you was talking about was Lua's strange ternary syntax using and
/or
.
Yes, this particular incident.
https://en.wikipedia.org/wiki/XZ_Utils_backdoor
In February 2024, a malicious backdoor was introduced to the Linux build of the xz utility within the liblzma library in versions 5.6.0 and 5.6.1 by an account using the name "Jia Tan".[b][4] The backdoor gives an attacker who possesses a specific Ed448 private key remote code execution through OpenSSH on the affected Linux system. The issue has been given the Common Vulnerabilities and Exposures number CVE-2024-3094 and has been assigned a CVSS score of 10.0, the highest possible score.[5]
Microsoft employee and PostgreSQL developer Andres Freund reported the backdoor after investigating a performance regression in Debian Sid.[8] Freund noticed that SSH connections were generating an unexpectedly high amount of CPU usage as well as causing errors in Valgrind,[9] a memory debugging tool.[10]
Immediately get noticed
Realistically, though, we are only aware of that one because it was noticed in that unlikely scenario and then widely reported. For all we know, most open source backdoors are alive and well in our computers, having gone unnoticed for years.
The first closest thing that comes to mind:
https://store.steampowered.com/app/301970/Screencheat/