I can't remember all the details of my dream but I do recall having to troubleshoot the activeX support in my VR headset, so I don't think it was a good dream
Someone on tumblr asked why 3.5" floppy disks seem so much more friendly (or "pleasant and edible" to use their terminology) than 5.25" floppy disks, so I wrote about it:
this electrical device is a special sort of terrible: They labeled the polarity of the DC power jack, but not the voltage (or current, for that matter)
You put in your username, and it's like "hey, log in with a code to your phone, or a password!" and my password manager already filled the password, so I just hit continue.
and then it asks me to verify a code it sent to my phone anyway for 2fa
Flying a Cessna Skyhawk low over Stoke-on-Trent and dropping "bibles" like I'm some sort of Christian missionary, but it turns out it's copies of Julia Serano's Whipping Girl, but they've been hollowed out and it's full of estrodiol valerate and cyproterone acetate
Here's a weird question: so Dynix made a text-based library catalog system that used Wyse terminals, and they shipped them with custom keyboards. They had four keys above the numpad: one of these keys was Start Over/New Search.
Does anyone remember having used these terminals, and recall what those other keys were?
And I've looked through all the pictures I can find of it and they're all like this: showing the keyboard, but cropped before you can see the buttons on the right.
there are rumors about 2fa possibly involving other things, like authentication apps or biometrics or "you bee keys", whatever those are, but there's no evidence of that ever being real.
it's just a password and a 6 digit number you get texted
I'm a "full stack developer", in that my stack is full and if you try to push any more tasks on me I'm gonna overflow it and start corrupting my own memory
@shironeko@foone you can generally copy and re-transmit the storage contents of most types of NFC cards using most NFC chipsets, with the exception of block 0 (UID) which is practically always locked to the unique identifier of your chipset. chipsets that'll let you change the UID are pretty rare.
(also some blocks on the NFC card you're trying to clone may be locked behind some sort of unlock key or handshake, with varying implementation details depending on the type)
@shironeko@foone normally it's the same deal for the cards - you can program everything but block 0, which is supposed to be factory programmed and fused off. but for most of the less fancy NFC card types you can buy "fully unlocked" variants on aliexpress that let you program all blocks with whatever you like, as many times as you like. but only really useful for cloning on basic systems that don't do any interactive checks, just "is the UID right? cool let them in".
You know the whole "defund the National Labor Relations Board" thing that musk & bezos are pushing?
I'm currently working on a project where I'm digitizing old supreme court records, and it makes me think we definitely need the NLRB, if only for how often they were having to sue companies for flagrant violations of labor law.
Seriously it seems sometimes every 3rd case is "Some Horrible Employer vs NLRB"