• 4 Posts
  • 62 Comments
Joined 4 months ago
cake
Cake day: March 6th, 2025

help-circle

  • Ah yeah there’s a little misunderstanding. IP addresses can be represented as 32-bit unsigned integer numbers, where each 8-bit chunk is separated by a dot.

    So the conversion is: 133742069 (decimal) -> 00000111111110001011110111110101 (binary) -> 00000111.11111000.10111101.11110101 (8-bit chunks) -> 7.248.189.245 (resulting IP)




  • It’s more along the lines of: Could you benefit from it because of some legit medical issues. Then go ahead.

    Do you want to take it recreationally to fit in your new dress for the wedding 3 weeks from now without any lifestyle changes? Don’t take it.

    Ozempic is not some fun new “weight loss shot”, it’s a fucking necessity for people with diabetes. That includes Type I diabetes, which is due to genetics and not lifestyle choices.

    Recreational users have made ozempic scarce, raising the price to unsustainable levels for folx that rely on it to stay alive















  • Nah not really…most of the time I’m at least doing a light metadata check, like who’s the maintainer & main contributors, any trusted folks have starred the repo, how active is development and release frequency, search issues with “vulnerability”/“cve” see how contributors communicate on those, previous cve track record.

    With real code audits… I could only ever be using a handful of programs, let alone the thought of me fully auditing the whole linux kernel before I trust it 😄

    Focusing on “mission critical” apps feels pretty useless imho, because it doesn’t really matter which of the thousands of programs on your system executes malicious code, no? Like sure, the app you use for handling super sensitive data might be secure and audited…then you get fucked by some obscure compression library silently loaded by a bunch of your programs.