I wonder how does this even works out in simple terms, like if a dev finds out that their creds have been stolen and published they would know that their system is compromised, so they have to reinstall the whole system locally? If they just change the password the worm is still rhere so it will steal the new password as well. But even if they would reinstall the whole system the worm is still somewhere there in the repo and will find it's way back again, so what are the mitigations in such a case?
I can't find that picture (it was anothet textbook cover probably) but imagine the students gear as a long cylindrical gear, and the two other as shorter gears, so when you move say the parents gear it would move the students gear and that in turn will move the teachers gear and it would look fine from the side but looks impossible from the front
You don't do major changes regularly/every night, updates can be automated/performed on the weekends.
Or you can do them during the normal working hours but also inform the users about the maintenance work by mail/push notifications. At work we use a service that provides notifications with times and dates about any possible downtimes.
I guess I should've made a more narrow remark and add that only unnecessary night labor must be banned - I used to work on a production that required intensive manual labor with 8AM-8PM and 8PM-8AM shifts and the only reason for the 8PM-8AM shifts was to make production more efficient by sacrificing the workers' health, although I know some people who love working at night and don't care that they look 74 in their 50's.
Indeed, and no AI here) Another project of this kind with impressive art is Ultima Ratio Regum that also relies heavily on procedural generation. In the current version it even generates wells and hedges and flowers in ANSI graphics which looks incredible, and the sole developer is working towards a steam release as well
It's yara (yet another recursive acronym), not to be confused with the malware testing suit/programming language YARA (which stands for Yet Another Recursive Acronym)
Yes BB seems to be the closest option but in order to unlock it's bootloader you also need to authorize on some manufacturer's site which is (to my understanding) a concern in the "consumer's right to repair" way - if I can't upgrade a system after its support ends the phone becomes e-waste, and giving your phone number, name, email address to the Chinese government is at least questionable from privacy standpoint. I could be exaggerating though
It's a classical roguelike, not a console game so a bit off topic from your original post but still a retro experience, there is a modern fork called nlarn that is still being developed and is comparable in gameplay to other modern traditional roguelikes such as Dungeon Crawl Stone Soup and Brogue, but the Dos and Amiga versions are surely the true retro way of experiencing it
Exectly my thoughts recently! My smartphone is starting to show some problems with its screen and it's a Xiaomi device which makes it very hard/unpleasant to get root access to reinstall the OS (you have to download a windows app and use it to share your data and reasons for voiding your contract by asking to get root access) so I thought maybe there are non-touchscreen smartphones and when I tried looking for one I only got dumb phone suggestions and I realized that such a phone would have to have a specific version of Android that is not designed around touchscreen technology. I'm not sure what I want, but the options seem to be polar extremes without a middle ground option, something between a smartphone and a dumbphone that will be helpful in detoxifying from doom scrolling and yet still usable for productive activities.
I really hope that in the near future we'll see some change in the direction towards smartphones that are not made only for watching videos, playing games, but to some combinations of useful ideas from both dumb and smartphones, like having a decent screen to be able to use maps and with also a "mechanical" keyboard or smth. But then again physical keys will have problems like if they would be made from cheap plastic, there always will be downsides...
I wonder how does this even works out in simple terms, like if a dev finds out that their creds have been stolen and published they would know that their system is compromised, so they have to reinstall the whole system locally? If they just change the password the worm is still rhere so it will steal the new password as well. But even if they would reinstall the whole system the worm is still somewhere there in the repo and will find it's way back again, so what are the mitigations in such a case?