![](https://lemmy.world/pictrs/image/0d37aaf8-99f4-4ef3-94a1-d270daf59f27.jpeg)
![](https://lemmy.world/pictrs/image/0943eca5-c4c2-4d65-acc2-7e220598f99e.png)
Hooched awn Foniqs Werked phone mini!
In any case I’d be shocked if handwriting wasn’t used for something other than note taking.
Hooched awn Foniqs Werked phone mini!
In any case I’d be shocked if handwriting wasn’t used for something other than note taking.
Chances are he was more like a cult leader it wasn’t until a decade or two after his death that things really got into full swing, so chances are the actual Jesus would be quite surprised by everything “he” did.
But there were a lot of Jewish mystics cropping up at the time so it’s not impossible or even implausible for some one vaguely matching the description to have existed.
Do I need to click? (Nope), Congrats OP!
insults aren’t illegal, and spam mail isn’t generally illegal either. as far as I know, there’s no law against sending an occasional email even if it is spam. the general exceptions are for commercial/businesses types and that’s generally only really illegal when it breaks the email carriers.
besides which, the OP is talking about opening a ticket on Reddit’s customer service system, not actually sending an email. Spez won’t even see it.
My guess is they’re not idiots and knew exactly what they were doing… and being paid for by whoever it was that stands to lose money if reclaimed water became popular
Malware is any unwanted thing on your computer that either you or your system has to deal with, whether in the form of software, emails, or pop-ups.
Malware is Malicious Software it’s a very specific thing, Cisco defines it as :
Malware, short for malicious software, refers to any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems. Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware. Recent malware attacks have exfiltrated data in mass amounts.
Spam email is unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list. Typically, spam is sent for commercial purposes. It can be sent in massive volume by botnets, networks of infected computers.
Sally from Accounting hitting reply all? spam. Kyle sending out embarrassing photos of Steve to everyone? Spam. your fifth cousin’s baby photos? well, I assume that’s spam. maybe you like baby photos.
those chain letters? spam. but not malware. They might contain malware, but the email itself is not malware. For example, a malicious image, won’t load- it has to go fetch the image first. Until you load the remote content, it’s not malware. It’s just a way of pointing you at the malware.
That said, it’s important to note that Raw Story is a legitimate company that wants your business. They’re not going to intentionally send you malware. mostly they’re going to be using the remote content to load pretty images and set up some basic telemetry (essentially read receipts. Maybe a cookie if you’re using a web client for your email, or perhaps clicked a link.) This is true of most legitimate companies. They want your business, so they’re not going to so brazenly piss you off with ransomware or a trojan.
As long as you’re not loading remote content and clicking links, there’s basically nothing that email can do to you. you can train your email client to recognize it as spam and send it straight to the bin; reducing potential accidental openings.
spam is just unwanted emails, it’s not software, in of its self.
Also, the tracking beacons only load if you let it. I assume you have your email client set to not load remote content. (If you don’t, you really should.) not sure what you use for email, but thunderbird (mozilla) does it automatically.
I’m not sure raw story is going to be sending malware.
Spam? In 37 different flavors,
Enamel paint is suitable for this as well- this is how I apply testors enamels, for example.
For applicators, check for “ink syringes”
“Treat your friends like family- exploit them.”
-Rules of acquisition as relayed by Quark
Main point is: why not let a large number of people who heard about a condition from their own qualified doctors help you at least scribble down some questions to ask your own medical folks at your next appointment? (But please avoid those crystal suppositories.)
Because:
You’re the project manager?
Not to mention, how frequently the “I can fix it on my own” guy ends up making things worse.
Like my coworker who insisted he knew how to install a monitor and then couldn’t figure out why the display port wouldn’t work with a usb-a adapter. It had a normal DisplayPort plug and didn’t have a thunderbolt adapter (it’s a desktop.)
Rather than update the ticket that got him the monitor, he created a new ticket.
I can’t complain too much. IT guy likes me so he took the extra monitor and gave me a third one.
And how does the phone know if you just take left turns faster? How does it know if you’re in the left or right lane? It has no way of knowing what the forces are, or if that variation is caused by something else.
Your phone has no idea which side of the car it’s on, and insurance companies and their apps really don’t care.
Motion sensors don’t provide localization. Gps on cellphones are only really accurate to a few dozen meters.
You can couple gps and motion (and changes in gps location) to fudge it. Which is why when you diverge off the route navigation provides… it takes it a moment to figure it out. In the display, they “know” you’re on the road so it doesn’t have to be that accurate, they just guess what lane you’re in based on direction and such.
They’re certainly not going to know what seat you’re in.
That process is safe until it’s not. There may be an exploit there waiting to be discovered. Thst exploit will never happen if you just don’t.
If you’re in a vaguely sensitive industry, there’s going to be a few people seeing what they can get into at those conferences.
This is especially true of things like cyber security conferences, or tech. They’ll be crawling with corporate spies.
Actually, I’d say any major trade or industry conference is going to have corporate spies and more… eh, freelance trying to see what they can get into.
So the question becomes: have you/your company run a background check on that guy? No? Then why the hell do you trust him?
I’m just gonna assume some one printed a butplug, had it snap off leading to said emergency room visit and they tried to sue lulzbot.
… how do you debug?!?
How do you copy and past everything from the broad shoulders of those who’ve come before?