![](https://radiation.party/pictrs/image/141f2b46-3cf2-43be-aa47-13d675abc438.png)
![](https://lemmy.ml/pictrs/image/a64z2tlDDD.png)
It’s not unheard of in folks who are in software dev because they love the repetition and routine. Farming is pretty similar to programming a computer, just with tons more manual labor.
It’s not unheard of in folks who are in software dev because they love the repetition and routine. Farming is pretty similar to programming a computer, just with tons more manual labor.
Classicube is pretty sick
Cinavia! Allegedly it’s still around and mandated in all consumer Blu-ray players.
The lifecycle would continue. Xchat to ychat to hexchat to dodecahedronchat…
They make a lot off of paid repositories and enterprise contracts, id be shocked if they had to enshittify it
A gun would help stop those witches from flying in the sky.
I may be taking this analogy the wrong way.
Most sites will do live inspection of browser capabilities rather than using the user agent to grok capabilities, simply because user agent is hardly reliable.
Looks like beeper got their stuff working again.
Can’t imagine this working out very well long term though
It’s feasible and has been used in various 0day exploits in the last few years. It’s getting significantly rarer nowadays but media player exploits leading to RCE has been a staple of malware distribution for a long while.
It’s just much easier to make a malicious word macro and hope the user isn’t careful than to research/identify an exploitable bug in a media player.
Generally you can’t reverse it into exactly what was written, but most of the time you can disassemble or decompile just about any program as long as the binary format is known. The legibility of the resulting unraveling may vary depending on language and any methods used to obfuscate the end binary.
I mean, almost all outreach is automated until you get to a meeting. The point of the post is to show that Reddit is reaching out, either intentionally (possible, based on the previous outreach) or unintentionally, to somebody that many companies would rather not do business with.
Because I wanted to share something I found humorous because of the context preceding it, but don’t have copies of that context anymore because it was so long ago.
They’ve aged out, I typically mark as spam and they’re deleted after 30d or so. It was essentially “hey Tate, love the content! Have you considered partnering with Reddit ads to expand your viewerbase?” And the follow-up was the typical “you haven’t responded, hope I got the right email!” spiel
The most interesting ones I’ve seen are from the likes of SAP concur, recruitment agencies offering developers, and private jet companies like Fly Alliance offering million dollar discounts on multi-million dollar jet contracts.
I’ve explained this in the description and various comments but I suppose I’ll repeat it here, but I have an email alias that is essentially almost a typosquat of one he likely does use, so some marketing company likely stuck it in their list on accident and fed it to loads of other companies.
This email is clearly automated but I did receive two more personalized outreach attempts last year, and I receive almost weekly personalized outreach from other companies due to the similarity in email. I know who they were intended for because they had a name set in the “to” field.
The key detail that made their intent clear is that to “to” name on the earlier correspondence had his name on it.
The email alias ended up being an almost-typosquatted version of one he would have, so I’m guessing some marketing agency stuffed it on their list of potential email addresses for him.
My thoughts? They probably don’t, but they’re hitting the email address just in case. The mixup is somewhat common, I receive marketing newsletters and outreach a couple times a week to that alias that have the “to” name set to “Andrew Tate”- pretty good indicator of who they’re trying to contact
Says who??
Almost certainly the case nowadays
Massgrave is a tool that can create legit (oem) keys for windows and office out of thin air*