Technology
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
Is this how we find out that Truth Social was running even harder on hopes and dreams than 4chan was?
Lol. Lmao, even
The best hacking. Everyone knows it. Everyone says it.
I'm still at a loss for words thinking that any real human people joined truth social. We really failed as a species...
Equally upsetting. The site is truthsocial.com not truth.social
Someone should buy truth.social and make it redirect to something trump's base hates.
Annoyingly, already registered
Meat spin?
They said something they hate.
…with a jump scare?
I'm thinking it might have some comedic value and if you're trying to beat the stock market..
DDoS is not hacking
Can be a component of it.
Mailing someone more letters than they're capable of replying to is not equivalent to, nor a component of, gaining access to the inside of their home.
I mean, I know JK Rowling sucks, and it's been a long time since the first Harry Potter movie came out, but it was definitely a component and precursor to Hagrid beating the shit out of that door.
To be fair, they had moved to an unsecure location that was a much softer target by that point. Can a DDOS force someone to move their services over to the equivalent of a century old, weather-beaten lighthouse in the middle of England?
Disabling network security and edge devices to change the properties of ingress can absolutely be a component of an attack plan.
Just like overwhelming a postal sorting center could prevent a parcel containing updated documentation from reaching the receiver needing that information.