

Huh, I hadn’t heard about this idea and a quick search on DDG returned this link: https://www.weforum.org/stories/2022/08/sustainable-data-centre-heating/
Interesting!
InfoSec Person | Alt-Account#2
Huh, I hadn’t heard about this idea and a quick search on DDG returned this link: https://www.weforum.org/stories/2022/08/sustainable-data-centre-heating/
Interesting!
Yep! Series 4 hasn’t “released” on YouTube yet. I saw Paul William’s story on instagram that they’re releasing Series 5 on TV, but sadly I don’t have access to that. I’m fine being behind by 1-2 years though.
I’m a huge fan of the original British TM, but TM New Zealand is honestly amazing. The whole thing is available on YouTube (thanks Little Alex Horne + team!!!).
In my and many of my friends’ opinion, TM New Zealand Series 2 is one of the best TM series. TM New Zealand in general is absolutely unhinged.
Series 1 feels a bit off, which is probably because it’s unlike British TM. I got used to it fairly quick though.
TM NZ Series 3 (final episode releases on YouTube in 2-3 days)
Are you in Europe? This is a thing I’ve seen in Europe, but not in other countries.
I knew about the “Thour” meme, but still didn’t get why the directory turned compressed. My guess is that by licking the lemon, the directory folds in on itself, thus becoming compressed.
The debug version you compile doesn’t affect the code; it just stores more information about symbols. The whole shtick about the debugger replacing instructions with INT3 still happens.
You can validate that the code isn’t affected yourself by running objdump on two binaries, one compiled with debug symbols and one without. Otherwise if you’re lazy (like me 😄):
https://stackoverflow.com/a/8676610
And for completeness: https://gcc.gnu.org/onlinedocs/gcc-14.1.0/gcc/Debugging-Options.html
Excellent question!
Before replacing the instruction with INT 3, the debugger keeps a note of what instruction was at that point in the code. When the CPU encounters INT 3, it hands control to the debugger.
When the debugging operations are done, the debugger replaces the INT 3 with the original instruction and makes the instruction pointer go back one step, thereby ensuring that the original instruction is executed.
https://en.wikipedia.org/wiki/INT_(x86_instruction) (scroll down to INT3)
https://stackoverflow.com/a/61946177
The TL;DR is that it’s used by debuggers to set a breakpoint in code.
For example, if you’re familiar with gdb, one of the simplest ways to make code stop executing at a particular point in the code is to add a breakpoint there.
Gdb replaces the instruction at the breakpoint with 0xCC, which happens to be the opcode for INT 3 — generate interrupt 3. When the CPU encounters the instruction, it generates interrupt 3, following which the kernel’s interrupt handler sends a signal (SIGTRAP) to the debugger. Thus, the debugger will know it’s meant to start a debugging loop there.
… I am 100% certain that if they switched to being individually wrapped tomorrow, a complaint about excessive packaging would be one of the top posts here.
You’re undeniably right. The best situation would be to not have any wrapping at all… but with the crumb situation, that’d be another top post here :/
Surprised no one’s mentioned HTTP Cats yet:
Personally, HTTP 405 (Method not allowed) is my favorite:
For anyone else who doesn’t want to spend 10 seconds trying to imagine it.
This is such a cool photo - I’m going to use it as my laptop wallpaper (if that’s okay 🤞)!
Oh boy, this was a 20 minute rabbit hole.
Tl;Dr: this is probably AI generated.
Using google image search, I found is that it was created by this account in Oct/2024:
https://www.instagram.com/gothtoon/p/DBh-p4WgThS/
Alternative front-end: https://imginn.com/p/DBh-p4WgThS/
There is the copyright symbol with this user in this image.
If you go through the comments and other posts by that user, it does look AI generated. Their threads account has a linktree, which has a link to a discord server, which I momentarily joined to see what the deal is about.
Looks like it’s a project started by a user named Emo Bot 9000, and they’ve created a bunch of characters, the most famous of which is the frog mage. This is a message on discord that supports this:
Another user asks whether the frog mage stuff is made using AI, and Emo Bot 9000 essentially replies yes:
Now, although the image in this lemmy post is, to the best of my searching, nowhere explicitly labeled AI, I think it mostly points to being generated by AI. The simplest way to confirm would be to ask them on their discord directly, which I don’t intend to do.
Although reverse search tells me there are earlier appearances of this image, they’re either false or the PFP of a commenter.