skeletorsass

joined 5 years ago
[–] skeletorsass@hexbear.net 9 points 1 day ago

Can not gain much intelligence. Principle of operation for S-300 is known already to all. Specific detail of radar and missile could be learned but not simply from looking. Must reverse engineer with Egypt knowing. Then will only learn this information for export radar and export missile.

[–] skeletorsass@hexbear.net 20 points 3 days ago

My field of work! It is sad because there is cheaper options available than this one which are more easy for Russia to get but I think the Russian developer only know how to work with Nvidia developer environment.

This is why Nvidia succeed. Other hardware option are competitive but do not use the proprietary Nvidia toolchain all the buy in.

[–] skeletorsass@hexbear.net 41 points 3 weeks ago

Enemies do not have a lot of air power. A bomb is more effective if you can drop it.

[–] skeletorsass@hexbear.net 13 points 3 weeks ago (1 children)

It will be very difficult. Hole is not very large at opening compared with bomb and bomb will lose a lot of energy if it impact the side.

[–] skeletorsass@hexbear.net 22 points 3 weeks ago* (last edited 3 weeks ago)

Claim of 60 meters reinforced concrete. Reinforced concrete is much weaker than rock. Penetration most likely less than 40m rock. Number even then very optimistic because it is almost marketing.

[–] skeletorsass@hexbear.net 30 points 3 weeks ago

Concrete bunker short distance under city block is a different task compare with deep rock. Much more easy to compromise structural integrity.

[–] skeletorsass@hexbear.net 27 points 3 weeks ago* (last edited 3 weeks ago) (5 children)

Can not work. Each bomb would have to land inside hole from previous. Would take many many. Penetrator is mostly kinetic. It would work very badly with solid rock.

[–] skeletorsass@hexbear.net 35 points 3 weeks ago

Ambulance? Shelter? Both are a military target according to isntrael

[–] skeletorsass@hexbear.net 22 points 3 weeks ago* (last edited 3 weeks ago)

My information on this bomb suggest that it is likely not sufficient for many facility. Capability is overstated and very overstated for rock penetration. Rock is very difficult to defeat.

[–] skeletorsass@hexbear.net 63 points 4 weeks ago (1 children)

Eat burger. Commit war crime. Die in ambush.

[–] skeletorsass@hexbear.net 33 points 4 weeks ago

Glad I wake up for this goku-halal cat-vibing

 

I do not know what it is. There is fire? Rich people? Please explain.

 

Near was an inspiration with their archival emulator work, and influenced my interest in this topic enormously (╥﹏╥)

 

我为长者续一秒

 

ARM instruction set has not changed very much at all since then and is in many chips in nearly every device. More are made than any other design.

She is also trans and transitioned in 1990s. Being a cis woman in technology can be frustrating even today. She was a trans woman in UK tech in 1990s.

This is a innovator in technology. Not Jobs, not Musk, not Gates. Wilson created the CPU design which is cheap, simple, efficient, strong, and has become universal today.

2
submitted 4 years ago* (last edited 4 years ago) by skeletorsass@hexbear.net to c/games@hexbear.net
 

If you do not hack your console you are a lib.

If it can be hacked there is a good chance that I have done it and can help you.

Open the world of homebrew, emulators, and easy game piracy.

Your warranty is now void.

2
submitted 4 years ago* (last edited 4 years ago) by skeletorsass@hexbear.net to c/technology@hexbear.net
 

Google do not want you to have this:

-----BEGIN PRIVATE KEY-----

MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQC10dxEGINZbF0nIoMtM870 5Nqm6ZWdb72DqTdFJ+UzQIRIUS59lQkYLvdQp71767vz0dVlPTikHmivdYHRc7Fo6JsmSUsG R3th+fU6d1Wt6cwpMTUXj/qODmubDK/ioVDW7wz9OFlSsCBvylOYp9v2+u/VXwACnBXNxCDe zjx4RKcqMFT31WTxqU9OM9J86ChMOW4bFA41aLAJozB+02xis7OV175XdQ5vkVXM9ys6ZoRF /K6NXeHiwcZFtMKyphXAxqU7uGY2a16bC3TEG5/km6Jru3Wxy4nKlDyUjWISwH4llWjdSi99 r2c1fSCXlMCrW0CHoznn+22lYCKtYe8JAgMBAAECggEAGOPDJvFCHd43PFG9qlTyylR/2CSW zigLRfhGsClfd24oDaxLVHav+YcIZRqpVkr1flGlyEeittjQ1OAdptoTGbzp7EpRQmlLqyRo HRpT+MxOHf91+KVFk+fGdEG+3CPgKKQt34Y0uByTPCpy2i10b7F3Xnq0Sicq1vG33DhYT9A/ DRIjYr8Y0AVovq0VDjWqA1FW5OO9p7vky6e+PDMjSHucQ+uaLzVZSc7vWOh0tH5M0GVk17Yp BiB/iTpw4zBUIcaneQX3eaIfSCDHK0SCD6IRF7kl+uORzvWqiWlGzpdG2B96uyP4hd3WoPcZ ntM79PKm4dAotdgmalbueFJfpwKBgQDUy0EyA9Fq0aPF4LIDHqDPduIm4hEAZf6sQLd8Fe6y wM4p9KOEVx7YPaFxQHFSgIiWXswildPJl8Cg5cM2EyMU1tdn5xaR4VIDk8e2JEDfhPtaWskp Jp2rU2wHvAXOeAES7UFMrkhKVqqVOdboIhlLdcYp5KxiJ3mwINSSO94ShwKBgQDavJvF+c8A INfCaMocUX0knXz+xCwdP430GoPQCHa1rUj5bZ3qn3XMwSWa57J4x3pVhYmgJv4jpEK+LBUL FezNLV5N4C7vH63aZo4OF7IUedFBS5B508yAq7RiPhN2VOC8LRdDh5oqnFufjafF82y9d+/c zCrVIG43D+KO2j4F7wKBgDg/HZWF0tYEYeDNGuCeOO19xBt5B/tt+lo3pQhkl7qiIhyO8KXr jVilOcZAvXOMTA5LMnQ13ExeE2m0MdxaRJyeiUOKnrmisFYHuvNXM9qhQPtKIgABmA2QOG72 8SX5LHd/RRJqwur7a42UQ00Krlr235F1Q2eSfaTjmKyqrHGDAoGAOTrd2ueoZFUzfnciYlRj 1L+r45B6JlDpmDOTx0tfm9sx26j1h1yfWqoyZ5w1kupGNLgSsSdimPqyR8WK3/KlmW1EXkXI oeH8/8aTZlaGzlqtCFN4ApgKyqOiN44cU3qTrkhx7MY+7OUqB83tVpqBGfWWeYOltUud6qQq V8v8LFsCgYEAnOq+Ls83CaHIWCjpVfiWC+R7mqW+ql1OGtoaajtA4AzhXzX8HIXpYjupPBlX lQ1FFfPem6jwa1UTZf8CpIb8pPULAN9ZRrxG8V+bvkZWVREPTZj7xPCwPaZHNKoAmi3Dbv7S 5SEYDbBX/NyPCLE4sj/AgTPbUsUtaiw5TvrPsFE=

-----END PRIVATE KEY-----

 

Fucking pieces of shit. Should not be this angry while drunk at nearly 4 in the night.

 

So we are all familiar at some point with the advice to use the command

dd if=image.iso of=/dev/sdx

or similar. People almost religiously think of dd as the tool to do this. It certainly can do the job, but not only is it really bad at it (mostly because it doesn't let the kernel automatically select a good block size), but it is also infamous for having a very fragile command syntax that is easy to typo and destroy your data with. dd wasn't actually written as a disk copying tool and is meant to be used as a data conversion tool. People using it to copy images to disks without doing any sort of conversion are kind of just abusing the fact that it reads one file in and writes another out. A lot of people don't know this, but on Linux/UNIX systems you can interact with block devices like they are normal files. As a result it's generally faster and safer to do something like

cp image.iso /dev/sdx

instead. People frequently uselessly risk using dd in places where ordinary file commands like cat and cp work fine. Some of you nerds probably already knew this but I want to spread it because people recommending dd is way too common.

Also, regardless of what commands you are using, when you finish doing anything involving writing to block devices always remember to run the command sync to make sure the kernel has actually written the data to the disk and isn't waiting to later.

view more: next ›