With enough quantum tunneling, anything is possible!
- 0 Posts
- 17 Comments
“Blows up blender with mind”
JCpacto Games@sh.itjust.works•Playdead's classic minimalist platformers Limbo and Inside are being pulled from GOG next week, so grab 'em while you canEnglish8·16 days agoI personally finished “Inside” in one sitting without planning to.
Phrasing…
JCpacto Gaming@lemmy.world•You would think the dinosaurs would have been a greater discovery then the artifact she is chasingEnglish23·22 days agoI want to argue with this, but it makes too much sense
I am hilarious and you will quote everything I say
I see eye of newt, but where, prithee, is your…
sQuIrT oF lEmOn? 🍋🟩🤏
JCpacto Programmer Humor@programming.dev•Which of these javascript expressions is false?English115·2 months agoNo, it’s Javascript, keep up
The topology enthusiast says the jug is full of glass
CSS is decorating a christmas tree off to the side. Some of the decorations are hovering in the air. We don’t correct CSS, as it seems to be having fun regardless.
Is it because of the “Host” HTTP header? I always thought it was optional, since the IP address and port were handled by the network and transport layers respectively. Turns out it’s required to resolve between different virtual hosts in the same server. Today I Remembered (TIR?) that virtual hosts are a thing…
Is there anything else that might indicate the domain name in the handshake connection?
I don’t get it… How does this protect anything? If we want our packets to reach a web server, we need to write the server’s IP address on them. If a snooper has the IP, can’t they just lookup the domain name from a DNS server? Or is that not a service DNS provides?
If the IP address is encrypted, how will the routers know where to send the packets? Only solution I can think of would be onion routing… Am I wrong??
JCpacto memes@lemmy.world•Pour one out for the youtubers that chased the algorithm away from what you enjoy.10·2 years agoThat’s right, baby! GAME AH DAH YEEAAAR!
JCpacto Ask Lemmy@lemmy.world•What single purchase has returned the most in terms of value?12·2 years agoIf you’re having fun after 1600 hours, then you’re not playing it wrong
This makes me wonder… If there really is someone automating these reports, how did they not forsee the potencial for reporting completely harmless commits? It’s like this was caused by someone who just recently got into the world of software and scripting and thought they were good enough to help with the security for decades-old software.
Was it intentional and - if so - what would they benefit from this??
deleted by creator