

1·
2 months agoA threat actor with code execution on a Linux desktop immediately has access to the filesystem and can do whatever anyway, in practice
No.
A threat actor with code execution on a Linux desktop immediately has access to the filesystem and can do whatever anyway, in practice
No.
Thank you for clarifying.
However we think
The times where I have trusted what tomshardware thinks are long gone.
There isn’t much overlap between the gaming community and the gaming journalist community.
“0b” is a prefix for binary number literals (at least in C++, probably other languages too). So in decimal that would be the number 2.
Literally nothing happens.
Linux init conservatives: Alright that’s the final straw, systemd!
Imagine a tool that gives you a language in which you can describe the hardware resources you want from a cloud provider. Say you want multiple different classes of servers with different sets of firewall rules. Something like Terraform allows you to put that into a text-based form, make changes to it, re-run the tool and expect resources to be created, changed and destroyed to match what you wrote down.