Zomg

joined 1 year ago
[–] Zomg@lemmy.world 24 points 1 day ago (2 children)

Idk, imagine being called a child, boy, preteen, teenager, or young adult when you're in your late 20s or older.

Hearing your friends say "the boys" or women hearing "the girls" is endearments between friends, not strangers.

[–] Zomg@lemmy.world 9 points 1 day ago (1 children)

This is exactly the type of tweet he'd make lol

[–] Zomg@lemmy.world 14 points 1 week ago

Unsurprising news from anyone with half a brain cell...

[–] Zomg@lemmy.world 7 points 1 week ago* (last edited 1 week ago) (7 children)

This situation you describe is something I don't see a major problem with. It being yours but under your parents control and secured away unless he's present with you sounds like a responsible approach that seems uncommon these days.

I dont have any children, but I still think it's the right and responsible thing to lock up my firearms.

[–] Zomg@lemmy.world 1 points 2 weeks ago

For context, plenty of facepunch forum users came over after they closed their forum.

[–] Zomg@lemmy.world 1 points 1 month ago

I use it now, and like it. Do you have any questions about it?

[–] Zomg@lemmy.world 21 points 1 month ago (3 children)

Nah, she disowned him actually.

[–] Zomg@lemmy.world 62 points 2 months ago (4 children)

If you assume it never will again, then you've been defeated

[–] Zomg@lemmy.world -2 points 2 months ago

I'm not disagreeing with you, but stop saying putler. It sounds forced as fuck and takes away from the points you're trying to make.

[–] Zomg@lemmy.world 1 points 2 months ago* (last edited 2 months ago)

The databases aren't encrypted exactly...

The DB don't even store passwords, but a hash of a user's password. When someone logs in, their password is hashed and compared to what's stored in the DB. If they match, entry is granted.

Passwords stored as one-way hashes are cracked by generating passwords and running them against the same hash algorithm, like sha256, sha-1 or md5 if you're especially shitty at protecting information. Same hash = same password in most cases. The cracking is done using GPUs because they accelerate at those types of functions. This doesn't even consider salted hashes which make the process more difficult for an attacker.

You do this locally so that you don't lock a username out or trip alerts or become noticed by someone until you're ready to gain access.

view more: next ›