I got fascia but I’m not a fascist.
- 6 Posts
- 656 Comments
Are you sure it’s the pill bugs? Because they usually only eat dead/decaying plant matter. You really don’t want to kill them off. Maybe they don’t have enough dead stuff to eat and so they’re going after your plants? Maybe you need some compost?
thenextguy@lemmy.worldto
Cars - For Car Enthusiasts@lemmy.world•General Motors to pay $12.75m settlement for selling drivers’ location and dataEnglish
7·16 hours agoTo each driver, right? /padme
Quantum particles don’t care if we’re looking or not. They only either interact with a detector or they don’t.
…is my point.
Person who doesn’t understand…
It’s Ocean’s, not oceans.
The Blue Man (brother implies more than one)
thenextguy@lemmy.worldto
Neat - For neat stuff you found@lemmy.world•Crossing the Mojave Desert on a Road No One Can ExplainEnglish
2·2 days agoSidetrack Adventures is always worth the watch.
Measured, not observed. There’s a huge difference.
thenextguy@lemmy.worldto
Space@mander.xyz•'Like putting a microscope into the core of the sun': World's 1st space-based neutrino detector launches to orbit
4·2 days agoStupid title, as expected.
This satellite is in earth orbit, Not anywhere near the sun. Sure, some future satellite may go closer to the sun, but nothing is ever getting close to the core.
https://www.ietf.org/archive/id/draft-thain-ipv8-00.html
North-south security – traffic from internal devices to the internet – is enforced at the Zone Server egress by two mandatory validation steps. First, every outbound connection must have a corresponding DNS8 lookup – no DNS lookup means no XLATE8 state table entry means the connection is blocked. Second, the destination ASN is validated against the WHOIS8 registry – if the destination prefix is not registered as an active route by a legitimately registered ASN holder the packet is dropped. These two steps together eliminate the primary malware command-and-control channel: connection to hardcoded IP addresses without DNS resolution.
At the global routing level, BGP8 route advertisements are validated against WHOIS8 before installation in the routing table. A route that cannot be validated is not installed. Manual bogon filter list maintenance is eliminated. Prefix hijacking is architecturally difficult – an attacker must compromise both an RIR registry entry and produce a validly signed WHOIS8 record.
This bothers me. It is no longer the Internet as it was. DNS becomes the primary means of addressing, not IP address.
thenextguy@lemmy.worldto
News@lemmy.world•Twin brothers, fired, wipe 96 US Gov databases
12·3 days agoNo backups?
We are the knights who say… Neesh!
thenextguy@lemmy.worldto
Anarchism@lemmy.dbzer0.com•[Discussion] What is your school of tought?
5·5 days ago“We take it in turns, to act as a sort of executive officer for the week.”
Lua Dipa?










Most cars and drivers don’t need this. And most chargers won’t be upgraded anyway.