[-] pandarisu@lemmy.world 9 points 1 month ago

I'd be more worried if you could find salt that was an organism

[-] pandarisu@lemmy.world 11 points 11 months ago

Inevitable political answer: The UK Government during the height of Covid

[-] pandarisu@lemmy.world 10 points 11 months ago

Twitter has always been "small" but popular with people who work in the media, so you hear it mentioned on the same level as Facebook by those people, even though it's never been any where near the same size

[-] pandarisu@lemmy.world 63 points 1 year ago

The Internet

On the positive side, it allows you to contact people that you would have never interacted with otherwise

On the negative side, it allows people to contact you that you never would have interacted with otherwise

[-] pandarisu@lemmy.world 8 points 1 year ago

They might exist, but they aren't widely known about like they are in the USA

[-] pandarisu@lemmy.world 10 points 1 year ago

The memes were making fun of the fact that no one had seen it, somehow Warner thought that re-releasing the film would make the memers go to see it, but that would have gone against the point of the meme

[-] pandarisu@lemmy.world 15 points 1 year ago* (last edited 1 year ago)

It looks like the game is part of Chrome but not Chromium, so it would be under Google's copyright. So if you mean a copy using the same assets then no. If you mean can you create an endless runner featuring a dinosaur, yes

[-] pandarisu@lemmy.world 10 points 1 year ago

We geeks do not care about syllables! We are the ones who "shortened" the 3 syllable "World Wide Web" to the 9 syllable "www"!

[-] pandarisu@lemmy.world 8 points 1 year ago
[-] pandarisu@lemmy.world 22 points 1 year ago

Strong Pokémon. Weak Pokémon. That is only the selfish perception of people. Truly skilled trainers should try to win with their favorites.

  • Elite 4 Karen, Pokémon Gold and Silver
17

Basic cyber security says that passwords should be encrypted and hashed, so that even the company storing them doesn't know what the password is. (When you log in, the site performs the same encrypting and hashing steps and compares the results) Otherwise if they are hacked, the attackers get access to all the passwords.

I've noticed a few companies ask for specific characters of my password to prove who I am (eg enter the 2nd and 9th character)

Is there any secure way that this could be happening? Or are the companies storing my password in plain text?

[-] pandarisu@lemmy.world 6 points 1 year ago

On the other hand you have insecure humans who make stuff up to pretend that they know what you are talking about

view more: next ›

pandarisu

joined 1 year ago