

I love how no matter how much the market makes it explicitly clear that an idea is absolutely terrible, Microsoft will just be like, “we’re doing it anyway, fuck you.” The best argument for Linux is just to gesture vaguely at Windows.
I’m Hunter Perrin. I’m a software engineer.
I wrote an email service: https://port87.com/
I write free software: https://github.com/sciactive


I love how no matter how much the market makes it explicitly clear that an idea is absolutely terrible, Microsoft will just be like, “we’re doing it anyway, fuck you.” The best argument for Linux is just to gesture vaguely at Windows.
It’s a limitation of the hardware.
So what you’re saying is I have two eyes in my beeholes?
But what came first, the human or the egg?
Hold on, wait a minute, pause. There are people who think that bugs have lungs?


Turns out, when you give the felon the keys to the prison, they open it and let their friends out.
Objectively, Chinese characters look cooler than latin characters, so he can just shut up and let us get water tattooed on us.


Why did you put an 850W power supply in that? You could probably put a 650W that’s much nicer for the same price.


Oh thank god. Minetest was the worst name, and the game is actually pretty cool. It definitely deserves a cool name, and Luanti sounds cool.


Technically, either side can request that the other generate a key and use that one, and it will cost an additional round trip. But generally in practice, each side generates their own key and tells the other side that it will be using that key.
Yes, those keys are for symmetric encryption, and yes, it’s for performance. It’s way faster to just exchange keys with asymmetric encryption rather than do the whole stream.
Also, I think you meant SSL, not SSH. SSH Uses a different key exchange protocol.
I love cryptography. :)


The CA just signs the certificate. They don’t have access to the private key, and thus can’t decrypt the key exchange.
The key exchange is the only thing decrypted by the private keys. From that point on, everything is encrypted and decrypted by the agreed upon cipher using the exchanged key, which is randomly generated for each session.


Like, decrypt it? None.
I think the post is saying that that small of a portion of Saddam is 400 calories.


Time to download some more Linux ISOs.


Backups and rollbacks should be your next endeavor.
I’m pretty sure she’s being sarcastic.
“What is your biggest weakness?”
“Bullet wounds.”
“…”
“Oh and stab wounds too.”
Humans have an innate urge to pet the doggos. Every time I see a dog in a video game I try to pet it. There’s even a catalog of games with pettable dogs: https://www.canyoupetthedog.com/
I feel like you’re an asshole if you buy a 22 foot long pickup to take to IKEA.
I mean, a good enough rock can be considered a tool. Same as an antler or a bone.