and that's why it should be illegal, the big "buy" button ahould have higher precedence over any "renting" claims in the ToS and any attempt of misrepresentation should be fined.
Glad to see that you're handling well. Accessing a SMBv1 drive is not an easy task. I had an asus router with a USB port to serve via SMBv1, in the end I chose to set up a raspberry pi with sftp to mitigate the EternalBlue exploit.
stack overflow has a lot of R knowledge, in questions already asked and in an active community. Try looking if your question has been asked there before, and if not, ask it. Many beginner questions are not about a particular language but about logic and math, maybe you can give a look at math.stackexchange also. For more simple questions, language models are very good (Chatgpt/bing, Bard)
I hope that's the case here. The sad thing is that not having the rights to something doesn't stops you from filling a claim, even scammers fill DMCA claims over original content, the movie is already down from archive.
private keys fit in a floppy disk, and their use range includes ransomware decryption and identity verification. In Mr. Robot, all 9-M could've been undone with a floppy.
Not all interested buyers are in the ad business, and governments can make payments in a way that is difficult to audit from a third party perspective, definitely not in any currency or a change in the balance sheet.
I wish things where different but seems to me that paying won't protect me from them harvesting every bit they can.
Indeed very interesting. It is a fundamental principle of finance: Investors seek to maximize utility, but this is under the axiom of complete rationality. And even if that condition is met (which I doubt), the utility function of money is not concave at all levels, for example leftmost of the graph, before the price of food. I think that after some point, utility becomes flat and Musk is way beyond that point. Additionally he seems to be a risk loving investor, not a risk averse.
I think it can be solved with a two step process. First, the mods of the community and only them can make a request to move from instance A to instance B, and second, the admins or mods of instance B approve the request, importing only the posts and comments from federated users.
sorry, I didn't saw your answer and also replied! I didn't remember that (.)COM was also a file extension, but now, thanks to your reminder, I will play some DOS games ;)
since .zip and .mov are recognizable file extensions, a url of the form google.com.docs.zelensky.zip could make people think that the domain is google.com pointing to a zip instead of the true domain, zelensky (dot) zip which probably would serve malicious content under that subdomain.
This is the comment I was looking for. I am very paranoid of technology and live in a constant fear of 0-day exploits and encryption backdoors.