• 1 Post
  • 4 Comments
Joined 4 months ago
cake
Cake day: May 9th, 2024

help-circle
  • Mine also starts off the exact same way?? I’m pressing the middle option

    Women are not allowed in this world anymore because of their own personal preferences or the way their body and body is designed and made and made and they have no choice to make decisions

    but right here it takes a different path:

    that make it a choice to do it and that makes them a bad person to do so they have no right of way of life or the choice that is not their right of way and that they are entitled and have to choose their choice to choose what to choose to choose to live with that choice is a right that is theirs and it’s a choice and not yours


  • My reasons were more hardware related. When I was a bit younger my parents gave me a netbook which had 32 GB of storage, and Windows used almost all of it. I wanted to do creative projects in my free time, but I couldn’t install programs or save any of my work. I would often restart to clear log files and gain a bit more working storage, which was extremely annoying because it took like 5 mins for the computer to finally settle down and be usable.

    I eventually got a 32GB flash drive which helped a lot, but it was not enough. With 4GB ram I could only have about 3 browser tabs open, and not all the programs I wanted could be run off the flash drive. It was still resource management hell.

    Somehow, some way, I learned about Linux. I got a 128GB microSD, put Mint on it. It truly set me free. I could install the software I wanted, I could make the things I wanted to make, I could open more programs at once, and I could do it all without unbearable lag. I never looked back since.




  • tuna@discuss.tchncs.detoScience Memes@mander.xyzElsevier
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    Imagine they have an internal tool to check if the hash exists in their database, something like

    "SELECT user FROM downloads WHERE hash = '" + hash + "';"
    

    You set the pdf hash to be 1'; DROP TABLE books;-- they scan it, and it effectively deletes their entire business lmfaoo.

    Another idea might be to duplicate the PDF many times and insert bogus metadata for each. Then submit requests saying that you found an illegal distribution of the PDF. If their process isn’t automated it would waste a lot of time on their part to find the culprit Lol

    I think it’s more interesting to think of how to weaponize their own hash rather than deleting it