Skip to content

BREAKING: X CEO Linda Yaccarino Steps Down One Day After Elon Musk’s Grok AI Bot Went Full Hitler

Technology
181 135 0
  • How social media became a storefront for deadly fake pills

    Technology technology
    1
    1
    18 Stimmen
    1 Beiträge
    5 Aufrufe
    Niemand hat geantwortet
  • 18 Stimmen
    3 Beiträge
    23 Aufrufe
    J
    Pretty cool stuff, thanks for sharing!
  • How Cops Can Get Your Private Online Data

    Technology technology
    5
    1
    107 Stimmen
    5 Beiträge
    24 Aufrufe
    M
    Private and online doesn't mix. Except if it's encrypted.
  • 816 Stimmen
    199 Beiträge
    678 Aufrufe
    Z
    It's clear you don't really understand the wider context and how historically hard these tasks have been. I've been doing this for a decade and the fact that these foundational models can be pretrained on unrelated things then jump that generalization gap so easily (within reason) is amazing. You just see the end result of corporate uses in the news, but this technology is used in every aspect of science and life in general (source: I do this for many important applications).
  • How not to lose your job to AI

    Technology technology
    16
    1
    9 Stimmen
    16 Beiträge
    56 Aufrufe
    rikudou@lemmings.worldR
    A nice "trick": After 4 or so responses where you can't get anywhere, start a new chat without the wrong context. Of course refine your question with whatever you have found out in the previous chat.
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    131 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • 21 Stimmen
    3 Beiträge
    23 Aufrufe
    B
    We have to do this ourselves in the government for every decommissioned server/appliance/end user device. We have to fill out paperwork for every single storage drive we destroy, and we can only destroy them using approved destruction tools (e.g. specific degaussers, drive shredders/crushers, etc). Appliances can be kind of a pain, though. It can be tricky sometimes finding all the writable memory in things like switches and routers. But, nothing is worse than storage arrays... destroying hundreds of drives is incredibly tedious.
  • Indian Government orders censoring of accounts on X

    Technology technology
    12
    149 Stimmen
    12 Beiträge
    45 Aufrufe
    M
    Why? Because you can’t sell them?