The source might look good, but are you (figurative you, I know you’re not OP) compiling it yourself or using the recompiled binaries? It wouldn’t be the first time github releases contained malware.
The source might look good, but are you (figurative you, I know you’re not OP) compiling it yourself or using the recompiled binaries? It wouldn’t be the first time github releases contained malware.
Yes and no. Banks are strictly regulated. But that’s why companies like Paypal continually remind people that they are not a bank, so they can escape that regulation.
Datacenters are usually not located where this would be useful. They’re placed where space and energy are cheap, because everything they do only needs Internet access. At most they’d heat the rest of the building for whatever office space there is.
I think you forgot a “not”
You’d have to get the gray water in, and it’s more efficient to just continue treating it and using the municipal water system.
No, trojans are never trustworthy.
But if you think it might be a false positive, put it into virustotal and a sandbox to see what it does.
That’s why I gave up on Plex. I couldn’t get it to play over Chromecast reliably and it kept forgetting my media library information. I haven’t had those issues with Jellyfin.
They just turn it off with group policy or intune.
The only required parameter is the appid, which is in the page URL. I don’t really know what the other IDs are, but you can mess around and see if it works.
Nope. The content is served through Steam, not on the page. You’ll have to find someone who mirrored it if it’s been taken down.
Edit: however, if it’s still available in the Steam CDN system, you may still be able to download it with a tool like this: https://github.com/SteamRE/DepotDownloader
They don’t get clicks.
It’s a simple question with a simple answer, and one that’s been asked and answered repeatedly. But I don’t think it’s a dumb question, which is why I answered it with a sufficient answer.
Sonarr, public trackers, usenet
Nobody would have been looking directly at the source data. The FBI or whoever provides the dataset to approved groups, but after that you just say “use all the images in this folder” and it goes. But I don’t even know if they actually provide real full-resolution images, or just perceptual hashes, or downsampled images.
And while it’s possible to use the dataset to generate new images assuming the training data had full-res images, like I said, I know they investigate the people making the request before allowing access. And access is probably supervised and audited.
And it saves them on bandwidth costs!
For reasonable people. For others, it’s an avenue to get away with war crimes.
Never? They were very clear about the first captchas being used to train OCR, way back in like 2010.
Then just say “something” not “someone” if you’re talking about things and not people. There’s no need to create unnecessary problems.
It doesn’t, but the mods (not just these ones, but of any technology community) never seem to remove posts that aren’t actually about technology.