gorysubparbagel

joined 1 year ago
[–] gorysubparbagel@lemmy.world 3 points 5 months ago (1 children)

Think of it like a club with a max capacity of 10 people, where some people have VIP cards. If a person with a VIP card wants to get into the club, the bouncer will kick out one of the people inside that doesn't have a VIP card to make space for them.

For a more technical explanation:

There are several processors on computers and each can be in use by 1 process at a time. Different processes can get different amounts of time based on their priority (called niceness in Linux) and they'll be removed from the processor once their time is up until their next share of time.

On a real-time kernel some processes are marked as real-time (certain range of niceness values, can't remember the exact range). If a process that is real-time says it needs some processor time, a process that isn't real-time that's currently running will be immediately ripped off the processor to make room for the real-time process.

[–] gorysubparbagel@lemmy.world 6 points 7 months ago (5 children)

Worth keeping in mind that the steam deck uses a distro based on arch, so it might be inflating the arch numbers in that steam survey.

[–] gorysubparbagel@lemmy.world 12 points 7 months ago

Man elections are going to be a mess with all the voice and video generation.

[–] gorysubparbagel@lemmy.world 13 points 7 months ago (1 children)

Then by that logic, redhat is leeching off the work of the Linux kernel developers and the other Foss software in redhat

[–] gorysubparbagel@lemmy.world 2 points 8 months ago (1 children)

You can change the config so you don't need to give the password every time.

Adding the persist option only requires it once every few minutes within a terminal session.

https://manpages.debian.org/bullseye/doas/doas.conf.5.en.html#persist

[–] gorysubparbagel@lemmy.world 6 points 8 months ago

Oh yeah that makes a lot of sense

[–] gorysubparbagel@lemmy.world 8 points 8 months ago (4 children)

Why can't they play with matching socks?

[–] gorysubparbagel@lemmy.world 2 points 9 months ago

You can use the magic bytes to detect it. Pretty sure windows executables have MZ as their magic bytes

https://en.m.wikipedia.org/wiki/List_of_file_signatures

[–] gorysubparbagel@lemmy.world 42 points 9 months ago (1 children)

Most email spam detection and antimalware use ML. There are use cases in medicine with trying to predict whether someone has a condition early

[–] gorysubparbagel@lemmy.world 8 points 9 months ago

So what you're saying is that they shouldn't drop the bass

[–] gorysubparbagel@lemmy.world 8 points 9 months ago* (last edited 9 months ago)

2 scenarios where it can be exploited:

Acquiring the ability to compromise a server or perform an adversary-in-the-middle impersonation of it to target a device that’s already configured to boot using HTTP

Already having physical access to a device or gaining administrative control by exploiting a separate vulnerability.

view more: next ›