84
top 19 comments
sorted by: hot top controversial new old
[-] nanook@friendica.eskimo.com 3 points 2 days ago* (last edited 2 days ago)

These, after do many decades, are still stupid funny. I can't help but picture an ugly 13 year old male desperate for companionship but not receiving any.

[-] CameronDev@programming.dev 26 points 4 days ago* (last edited 4 days ago)

I started reading and though this was someone who had lost their marbles, by target 2 I was hooked.

And next to his original, fully erect penis, was another one. Identical. Bio-engineered, apparently. He struck a pose.

Poetry.

[-] zer0@programming.dev 23 points 4 days ago

For me it was

— I’d seen weirder things in Perl scripts —

Just perfect. No notes.

[-] LainTrain@lemmy.dbzer0.com 19 points 4 days ago

Pretty fun (and funny) sci-fi story, the open source katana bit gave me unix surrealism vibes but then again what doesn't these days.

[-] sebastiancarlos@lemmy.sdf.org 18 points 4 days ago

Thanks! I borrowed the open source katana bit from unix surrealism

[-] GustavoM@lemmy.world 19 points 4 days ago

How to become a hacker

Average Linux user: Hack the white house

Your mom: Install pi-hole

[-] eraor@lemmy.ml 7 points 4 days ago

I want to see a live action of this.

Have you seen Blackhat from Micheal Maan. (I’m no hacker/programmer/or whatever techie)

[-] eraor@lemmy.ml 3 points 3 days ago

Yeah I did. Honestly it's not worth your time.

[-] Warl0k3@lemmy.world 10 points 4 days ago

Fun background info: Trusted Representatives don't actually carry their shard of the key (to prevent exactly this scenario), they have (iirc) a keycard which allows them to access the secure storage medium where their different pieces are stored.

[-] FauxLiving@lemmy.world 7 points 4 days ago

to prevent exactly this scenario

I'd love to be in the group that brainstormed this exact scenario

[-] sebastiancarlos@lemmy.sdf.org 5 points 4 days ago* (last edited 4 days ago)

Every software system worth its salt should have safeguards against Nokia nunchuck attacks.

[-] FauxLiving@lemmy.world 3 points 4 days ago

And now we move on to the second item on the agenda: Advanced Protection against Shrubbery and Why We Need It

[-] eus@lemmy.ml 6 points 4 days ago

I had a blast reading this and had some great laughs throughout–thanks for sharing and making my morning!

[-] Pika@sh.itjust.works 6 points 4 days ago
[-] littleomid@feddit.org 3 points 4 days ago

A beautiful read. I’ll keep checking my certificate resolutions.

[-] jamie_oliver@lemmy.world 2 points 4 days ago

So good. the vatican while loop one was a lot of fun too

[-] ReversalHatchery@beehaw.org 1 points 4 days ago

I don't get what the others are talking about, there is nothing after this, even through scribe or on an archive.org snapshot made recently

Taking him down would put the fear into the rest and, hopefully, get some intel on the other keyholders through the IRC backchannels.

[-] sebastiancarlos@lemmy.sdf.org 0 points 4 days ago* (last edited 4 days ago)

You probably have an extension which removes the "Friend link" query param from the URL

this post was submitted on 28 Mar 2025
84 points (89.6% liked)

Linux

52674 readers
838 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS