

We already have a few “microcode” jailbreaks
We already have a few “microcode” jailbreaks
Also maybe try not to harass them about which instance they choose to join (unless it’s a tanky one lmao), just try to educate them if the subject comes up. I think it’s overwhelming to jump right away into “this instance has this problem, you should move to this other one”
I say this still not having moved from Lemmy.world
Welcome!
Yeah, my mom has unmanaged schizophrenia and my dad is an abusive piece of shit. So yes, very much so
Suno.ai most likely
This is hak5. They make penetration testing Tools
I’m aware yet I’ve been seeing so many so-called lefties going crazy for the DNC.
I think the desperation and need to defeat Trump has led to a lot of “blind acceptance” of Democrats
Dumb people are down voting you despite the fact that you’re 1000000% correct.
Leftists need to stop defending the Democratic party so hard, it’s making them look like neo liberals
It’s from hitchhikers guide to the galaxy
Most games use UDP as the latency induced by TCP is unacceptable for games
Eligible for best of lemmy
Diagramming would be a good fit imo
That’s decently more expensive! $300-700 difference is pretty significant imo. Like I couldn’t swing that I don’t think, pushes it too expensive
What an insane thing to ask
Running away from home at 17. Saved my life
I agree. I try to save them when I can, I’ve gathered quite a few. Luckily, extracting the lithium cells is quite easy. I even have a model with a screen on it (the e waste is crazy) that I’m planning to hopefully salvage the screen off of.
deleted by creator
It doesn’t seem like a no brainer to me… In order to generate the spam AI comments in the first place, they have to use expensive compute to run the LLM.
I had the same question. Here’s the answer:
The Archive Team Warrior is a virtual archiving appliance. You can run it to help with the Archive Team archiving efforts. It will download sites and upload them to our archive—and it’s really easy to do!
The warrior is a container running inside a virtual machine, so there is almost no security risk to your computer. (“Almost”, because in practice nothing is 100% secure.) The warrior will only use your bandwidth and some of your disk space, as well as some of your CPU and memory. It will get tasks from and report progress to the Tracker.
Or pixelated blurs