Lemmy Shitpost
Welcome to Lemmy Shitpost. Here you can shitpost to your hearts content.
Anything and everything goes. Memes, Jokes, Vents and Banter. Though we still have to comply with lemmy.world instance rules. So behave!
Rules:
1. Be Respectful
Refrain from using harmful language pertaining to a protected characteristic: e.g. race, gender, sexuality, disability or religion.
Refrain from being argumentative when responding or commenting to posts/replies. Personal attacks are not welcome here.
...
2. No Illegal Content
Content that violates the law. Any post/comment found to be in breach of common law will be removed and given to the authorities if required.
That means:
-No promoting violence/threats against any individuals
-No CSA content or Revenge Porn
-No sharing private/personal information (Doxxing)
...
3. No Spam
Posting the same post, no matter the intent is against the rules.
-If you have posted content, please refrain from re-posting said content within this community.
-Do not spam posts with intent to harass, annoy, bully, advertise, scam or harm this community.
-No posting Scams/Advertisements/Phishing Links/IP Grabbers
-No Bots, Bots will be banned from the community.
...
4. No Porn/Explicit
Content
-Do not post explicit content. Lemmy.World is not the instance for NSFW content.
-Do not post Gore or Shock Content.
...
5. No Enciting Harassment,
Brigading, Doxxing or Witch Hunts
-Do not Brigade other Communities
-No calls to action against other communities/users within Lemmy or outside of Lemmy.
-No Witch Hunts against users/communities.
-No content that harasses members within or outside of the community.
...
6. NSFW should be behind NSFW tags.
-Content that is NSFW should be behind NSFW tags.
-Content that might be distressing should be kept behind NSFW tags.
...
If you see content that is a breach of the rules, please flag and report the comment and a moderator will take action where they can.
Also check out:
Partnered Communities:
1.Memes
10.LinuxMemes (Linux themed memes)
Reach out to
All communities included on the sidebar are to be made in compliance with the instance rules. Striker
view the rest of the comments
The smartest sports fan I knew was an Auburn fan. He had gone there and gotten his education, became a self important engineer at a major transportation company. His password for half a decade on everything, personal or commercial, was a variation of War Eagle.
I do not understand how even the smartest of sports fans manage to make it their whole personality to the point that they can’t even come up with a decent password because the most obscure thing they can think about is the very popular Eagle thing his college had done for decades.
The real problem though is him sharing his passwords with you!
I never said he gave me the password.
Then how did you know it?
It’s pretty trivial to write a piece of software that records key presses to a log file. It turns out, if you take a kid that really really likes computers, and you lock them out of their computer, they will use their knowledge of computers to be able to use their computer.
At first I was happy to just run a mandrake Linux live CD but they found out what I was doing and disabled the disk drive as boot option.
Eventually I had to figure out how to maintain access, so I intentionally borked the parental control software by rebooting in safe mode over and over and corrupting the files for it before it could initialize and lock the files. Eventually it was so fucked they had to log on to fix the parental control installation which was when I got the password.
After I got the password and could do what I wanted again I found out how to clear CMOS which reenabled the disk boot.
I think we went back and forth a little longer, but eventually they gave up and I was allowed to just administrate my own computer.
oh... so crime
E: OH -- I see. Wow. I learned everything I know about networking and computers in a similar way :P Thanks Dad
Unauthorized access by itself wasn’t illegal at the time, but yes, nowadays it would be a crime. One of the major points of the 87 Computer Fraud act was that you gain unauthorized access with the intent to defraud or damage. I was trying to fix my computer that I owned and bought with money I had worked for because 30 minutes a day wasn’t enough to type up a paper for school, let alone to actually do anything of any consequence on dial up.
Oh my dad was cooler than that and would just cloak and dagger me for porn