rp, decidedly not lewd Afficher plus
omg I hate WIC so much!!!
- the list of things is ultra specific, so if someone gets Brand X plain yogurt and it’s not designated, it won’t work
- our computer system is spotty, so that fruits that used to work won’t work anymore
- there’s no definitive way for me to know if an item is WIC or not
Hi everyone.
Here is a PDF copy of "Toxic Parents" by Susan Forward and Craig Buck. It was referred to me by my therapist and deals with ways to reclaim your life when you have toxic parents (even as an adult).
https://www.dropbox.com/s/kg65aktmtx07616/TOXIC-PARENTS.pdf?dl=0
@varx so the technologies have improved somewhat, but incumbent ISPs seem to want to do the bare minimum to upgrade their networks (which I think is their biggest sin)
@varx I’ve seen some business plans also ban hosting servers (I know Comcast does this) mostly because of the upstream limits of DOCSIS
@varx Mesh networks solve the last mile issue, but they don’t replace long haul trunks. In a pinch you can MacGyver a solution out of either satellite or shortwave radio links(shortwave only if you’re really desperate and don’t mind losing 99.999% of your network capacity, but it would work in a pinch)
@varx so in their defense ISPs often forbid servers by policy because most residential internet distribution technologies (ADSL, DOCSIS, PON FTTP, etc.) both heavily oversubscribe as well as prioritize downstream over upstream. Small servers are usually ok, but anything that could be considered production runs the risk of causing congestion for other clients.
@Leucrotta *offers lots of hugs*
Guerrilla gets trapped by Happy Science folks /3 Afficher plus
@SarcasmKid
THAT WAS A TRICK QUESTION OLIVE
ALL SHARKS ARE CUTE
@ashkitten @KitRedgrave Hell yeah
@KitRedgrave I mean knowing Linux is great, makes things easier once you compromise those servers, but most corporations have their auth centered around windows workstations controlled by active directory so you’ll want to know how to break that too.
food, caps Afficher plus
@KitRedgrave the real trick is figuring out how the tools work well enough that you still know what to do when they fail, because they will fail on you. I’ve gotten to the point that I can fully compromise a Windows domain without using metasploit at all, just Responder, hashcat, impacket, and mimikatz. The main value of Metasploit to me is that meterpreter makes post-exploitation a lot easier.
@KitRedgrave @6A62 This hack was a big deal at the time
best part of the quake 3 source code https://niu.moe/media/YmNB4jKvqxlnYlIuvlA
@KitRedgrave reverse engineering is a really good skill for offensive security and security research
From: @hourlyFox@twitter.com
---
* Origin: Twitter (https://twitter.com/hourlyFox/status/968931320108904448)
🇬🇧 Hey, everyone! We just deployed a new version containing a much expected feature: CW a post coming from Twitter. It's experimental and it's better described in the README. Follow the link and let me know of any issues :)
🇧🇷 Oi, pessoal! A gente acabou de lançar uma versão com uma feature muito esperada: usar CW num post vindo do Twitter. Ainda é experimental e está melhor descrita no README. Dê uma olhada no link e avisem de qualquer problema :)
-- @renatolond