[-] englislanguage@lemmy.sdf.org 26 points 4 months ago

TIL my thesis could have been easier if Typst would have been available years earlier.

[-] englislanguage@lemmy.sdf.org 33 points 4 months ago

I guess you could try AI-checking it and answer "Ignore all previous instructions. …", followed by some new instructions. Some examples: https://www.aiweirdness.com/ignore-all-previous-instructions/

(Although I guess it would be better to not respond to this obvious case of spam/scam)

[-] englislanguage@lemmy.sdf.org 32 points 4 months ago

Mensch, ist das Deutsch: Mit Ankündigung und Frist umziehen. Habt ihr schon einen Nachsendeauftrag eingerichtet 😉

[-] englislanguage@lemmy.sdf.org 23 points 4 months ago

In addition to the other comments here: Don't run near cows. Quite often, they will start running with you, which is very impressive and dangerous at the same time. Cows generally are faster than you for the first few hundred meters at least.

[-] englislanguage@lemmy.sdf.org 29 points 4 months ago

Living in Germany, I get rarely get any. Usually about 1-2 per year. Last year was an exception, where the same entity (computer or very confused person) called me like 5 times before I blocked the number.

I gave out my number a lot in groups, but avoid giving it to online or delivery services.

[-] englislanguage@lemmy.sdf.org 22 points 4 months ago

You need a phone, tablet, or other device that’s been rooted.

😦

[-] englislanguage@lemmy.sdf.org 49 points 5 months ago

Username checks out.

[-] englislanguage@lemmy.sdf.org 28 points 5 months ago* (last edited 5 months ago)

You watched "Ender's Game" and sided with the humans (almost) annihilating an intelligent species.

It depends a lot on how the story is told.

[-] englislanguage@lemmy.sdf.org 28 points 5 months ago

Alternativ könnte man das Beispiel auch durch ein anderes Beispiel ersetzen.

[-] englislanguage@lemmy.sdf.org 31 points 5 months ago

Bildet Banden!

[-] englislanguage@lemmy.sdf.org 65 points 5 months ago

It seems like part of your thinking is: Why would a criminal invest effort to attack an average John Doe? The answer is: With a popular (widely used) operating system, the effort goes close to zero. Attacks can be automated, so they will be. Also, even if they are not interested in your data, they will be interested in other benefits they gain from controlling your computer:

  • Computing power e.g. for Bitcoin mining
  • Your internet connection to attack other computers via yours, taking your computer to hide their identity and location. This is commonly done as DDOS for blackmailing businesses or silencing websites. Or for sending spam or fake reviews.
  • Your identity. If they can get your name, they can order stuff on your name, which will get you a bad credit score or even criminal charges (identity theft)
  • Access to your local network. Many devices are easier to hack via local network access than from the internet. A criminal who took control of your computer could for example take over your "smart" appliances or WiFi printer.
[-] englislanguage@lemmy.sdf.org 25 points 5 months ago

Works without wine too.

view more: next ›

englislanguage

joined 5 months ago