65 on my phone. None of them are junk, one is the new tab page so I can search immediately. 🤷
Is that better or worse than pushing a corrupt C-00000291*.sys?
Gross, why.
With how big Australia is and how long the stretches are in which there are only things that want to kill and/or consume you how wise is it to do that? I’m not trolling, if I got jumped by a rowdy gang of drop crocs I’d rather people at least knew where to start looking for the pieces.
Feeling personally attacked here… I’m coincidentally trying to get ipv6 remote to my machine working right but I don’t know what I’m doing so while everything is working by itself anything I try fails… 💀
(I don’t need help, it’s better if I learn it the hard way)
You’re correct, but I still am not comfortable taking the chance.
Too great a chance someone downloads csam through it and I get blamed.
You’re good, I was making an unrelated BOFH reference, even more obscure. 🤣
Does it involve quicklime?
That’s why I felt OK copying the whole first page. 🤣
SECRETARY OF DEFENSE
1000 DEFENSE PENTAGON
WASHINGTON , DC 20301 - 1000
JANUARY 2021
CLASSIFIED: TOP SECRET - NOT FOR PUBLIC RELEASE
SUBJECT: RUSSIAN HACKINGS OF FEDERAL GOVERNMENT ASSETS
Throughout 2020, the United States received intelligence that Russian hackers have
infiltrated secure government databases and servers, including those located in The Pentagon, the
Intelligence Community, the US Treasury, the Department of Homeland Security, the Commerce
Department, and Health and Human Services. Within the servers affected, 18,000 US
organizations had malicious code in their networks; 50 of them suffered major breaches. As of
the 13th of December, when this knowledge was made known to US officials, the Cybersecurity
and Infrastructure Security Agency (CISA) has been working tirelessly to secure networks and
alleviate any vulnerabilities in the systems that were affected. Russia has denied responsibility
for such hackings.
This hacking poses a major threat to US cybersecurity, as it is one of the most significant
hackings in modern history. The Department of Defense, Homeland Security, and CISA have
urged Congress to take action against this emerging threat. In response, Congress has introduced
the following piece of legislation, named after an essential cybersecurity tool: A Bill to
C.A.P.T.C.H.A. (Create a Procedure to Combat Hacker Attacks). It is your responsibility as
Congress to come to a decision on this legislation before more damage is done.
Why would I want this again?
Did you try setting it to wumbo?
Computer code program development engineer, Esq.
They probably get you in bandwidth fees over X amount. It would cost pennies for a small scale virtual server with big numbers as the hardware is shared, it would spend most of the time not doing anything. They could set up a machine and oversell a tier like that and make it all back with profit on their first bill.