![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/0d5e3a0e-e79d-4062-a7bc-ccc1e7baacf1.png)
I’m guessing you’re underestimating the amount of little kids who are simply put in front of a tablet with Pepa Pig on YouTube
I’m guessing you’re underestimating the amount of little kids who are simply put in front of a tablet with Pepa Pig on YouTube
The bottom still suggest to tip… It’s not used to give their employees a better wage, it’s to show lower prices on the menus.
And other deals + free coffee during business days.
Return window was also bigger if you were a family member. At least where I live.
JavaScript from 1999 was Microsoft’s JavaScript. You could also run that through WSH.
You’re thinking of profit, not revenue
Plex started banning Hetzner not too long ago, jellyfin doesn’t call home in the same way and should keep working.
The back-up procedure is usually written with systems breaking in mind, not a malicious actor trying to wreak havock.
A lot of times the back-ups machines are always connected (or easily discovered since they’re always online) which allows an attacker to remove the back-ups too.
There are plenty of different ways to DDoS. Judging by the post it’s an entity which is currently sending specifically crafted requests to use as many system resources, targeting Lemmy the application.
Cloudflare blocks other less knowledgeable DDoS attacks. So yes, Cloudflare does have a point but it can’t protect against everything
The ease of not having to boot into dev mode and rebooting into retail mode if you want to play with friends.
You also don’t need to pay the dev fee iirc.
Booting out of dev mode will also remove your apps if you don’t explicitly tell it not too. Which in turn is a hassle (there is an app that can be used to bypass this question tho).
I honestly don’t think a lot of the community sees Oracle as the good guys…
Had the same with liftoff. Probably the app thinking the JWT is valid but the server declining it out of precaution.
I just logged out and back in again.
Ah yes, the fabled support contracts for enterprise applications.
Where you have to answer the same questions over and over again. Don’t worry, in 3-10 business days you’ll be talking to someone who has actual experience with it. Who then labels your problem as a bug that they won’t fix soon.
Honestly depends on what he’s hosting… Services like shodan are constantly scanning the web and are trying to see what is actually running in the machine.
If he’s serving something that’s vulnerable and has rce it won’t take too long for him to get automatically pwned.
We’ve seen this with the hafnium Echange vulnerability and all known vulnerable public facing web apps that used log4j.
Regarding the LastPass breach, the second part of the breach was using a very outdated version of Plex. Chances are high that his home machine was already hacked by other malicious actors.
I use both practically daily.