I’d say, let’s have everyone brainstorm the best way to go about this, and let a thousand flowers bloom!
I’d say, let’s have everyone brainstorm the best way to go about this, and let a thousand flowers bloom!
It is time for the mainland to come back into the fold.
I agree the mainland should be allowed to maintain some amount of self rule during the transition.
You can list every man page installed on your system with man -k .
, or just apropos .
But that’s a lot of random junk. If you only want “executable programs or shell commands”, only grab man pages in section 1 with a apropos -s 1 .
You can get the path of a man page by using whereis -m pwd
(replace pwd
with your page name.)
You can convert a man page to html with man2html
(may require apt get man2html
or whatever equivalent applies to your distro.)
That tool adds a couple of useless lines at the beginning of each file, so we’ll want to pipe its output into a | tail +3
to get rid of them.
Combine all of these together in a questionable incantation, and you might end up with something like this:
mkdir -p tmp ; cd tmp
apropos -s 1 . | cut -d' ' -f1 | while read page; do whereis -m "$page" ; done | while read id path rest; do man2html "$path" | tail +3 > "${id::-1}.html"; done
List every command in section 1, extract the id only. For each one, get a file path. For each id and file path (ignore the rest), convert to html and save it as a file named $id.html
.
It might take a little while to run, but then you could run firefox .
or whatever and browse the resulting mess.
Or keep tweaking all of this until it’s just right for you.
He literally just fixed it, and he learned nothing from this, Dunning-Kruger as strong as always.
Instead of simply blurring them, it’d be technically possible to feed their images through a stable diffusion prompt, like “humanoid lizards” or “frantic lemmings”…
Also, I understand that a large language model could be made to rewrite articles about them with a matching prompt.
That would be very silly, of course.
Yes, it really was renamed after the Zuckerbergs, as buildings sometimes are at the request of a large donator seeking posterity.
See Wikipedia:
In November 2008, San Francisco voters approved an $887.4 million general obligation bond for the General Hospital rebuild, work began in 2009, and was expected to be finished in 2015.
In 2015, Facebook founder and CEO, Mark Zuckerberg, and his wife Priscilla Chan gave $75 million to help fund equipment and technology for the new hospital.
More appropriate tools to detect AI generated text you mean?
It’s not a thing. I don’t think it will ever be a thing. Certainly not reliably, and never as a 100% certainty tool.
The punishment for a teacher deciding you cheated on a test or an assignment? I don’t know, but I imagine it sucks. Best case, you’d probably be at risk of failing the class and potentially the grade/semester. Worst case you might get expelled for being a filthy cheater. Because an unreliable tool said so and an unreliable teacher chose to believe it.
If you’re asking what’s the answer teachers should know to defend against AI generated content, I’m afraid I don’t have one. It’s akin to giving students math homework assignments but demanding that they don’t use calculators. That could have been reasonable before calculators were a thing, but not anymore and so teachers don’t expect that to make sense and don’t put those rules on students.
There are stories after stories of students getting shafted by gullible teachers who took one of those AI detectors at face value and decided their students were cheating based solely on their output.
And somehow those teachers are not getting the message that they’re relying on snake oil to harm their students. They certainly won’t see this post, and there just isn’t enough mainstream pushback explaining that AI detectors are entirely inappropriate tools to decide whether to punish a student.
No True Christian would ever activate a fully automated sentry killbot that doesn’t use at least one of its compute cores to pray to the Almighty on a loop.
“I’m not X but <position statement that clearly requires them to be X” and “I don’t want to Y but <proceeds to do exactly Y>” are used by people that mistakenly believe a disclaimer provides instant absolution.
On the other hand, I’ve never had anybody threaten to yuck my yum in exactly those terms, and I’m slightly intrigued by the prospect.
I was watching the network traffic sent by Twitter the other day, as one does, and apparently whenever you stop scrolling for a few seconds, whatever post is visible on screen at that time gets added to a little pile that then gets “subscribed to” because it generated “engagement”, no click needed.
This whole insidious recommendation nonsense was probably a subplot in the classic sci-fi novel Don’t Create The Torment Nexus.
Almost entirely unrelated, but I’ve been playing The Algorithm (part of the Tenet OST, by Ludwig Göransson) on repeat for a bit now. It’s also become my ring tone, and if I can infect at least one other hapless soul with it, I’ll be satisfied.
deleted by creator
It could be anything that makes it worth paying money for the accounts in the first place.
Unfortunately, looking from the outside, it’s difficult to tell if an account has been bought, hacked, or if the original owner just decided to become a scumbag out of nowhere.
For example, have a look at https://www.reddit.com/user/fakerht, a 4 years old account that, just 30 minutes ago, decided to promote a scam site that attempts to steal crypto by luring them with the promise of an airdrop.
deleted by creator
That mirrors the tension many reddit mods struggled with recently… It’s difficult to push back against Reddit without also punishing its active users in some real way.
The folks using Reddit are still real human beings. But I get that not everybody is going to draw the line in the same spot.
To push back on that a bit, many Reddit “aged accounts” are used to push scams to the great unwashed masses.
I’m not sure it’s morally okay to turn a blind eye from who’s buying those accounts or why.
I honestly don’t know. The only advice I’d have for the layman would be “just don’t do this”, but I understand that’s little more than an invitation to be ignored.
Running strange software grabbed from unknown sources will never not be a risky proposition.
Uploading the .exe you just grabbed to virustotal and getting the all clear can indicate two very different things: It’s either actually safe, or it hasn’t yet been detected as malware.
You should expect that malware writers had already uploaded some variant of their work to virustotal before seeding it to ensure maximum impact.
Getting happy results from virustotal could simply mean the malware author simply tweaked their work until they saw those same results.
Notice I said “yet” above. Malware tends to eventually get flagged as such, even when it has a headstart of not being recognized correctly.
You can use that to somewhat lower the odds of getting infected, by waiting. Don’t grab the latest crack that just dropped for the hottest game or whatever.
Wait a few weeks. Let other people get infected first and have antiviruses DBs recognize a new malware. Then maybe give it a shot.
And of course, the notion that keygens will often be flagged as “bad” software by unhelpful antivirus just further muddies the waters since it teaches you to ignore or altogether disable your antivirus in one of the most risky situation you’ll put yourself into.
Let’s be clear: There’s nothing safe about any of this, and if you do this on a computer that has access to anything you wouldn’t want to lose, you are living dangerously indeed.
Several times now, I’ve sent people I knew links to articles that looked perfectly fine to me, but turned out to be unusable ad-ridden garbage to them.
Since then, I try to remember to disable uBlock Origin to check what they’ll actually see before I share any links.
It’s weirdly difficult to remap the “office” key so that pressing it won’t open an ad for ms office 365 and pressing office+L won’t open linkedin.com, and a few more equally valuable core OS features.
In the end I just had to grab a small bit of C code from GitHub, compile it, move the exe to the startup folder, have Windows Defender yell at me for having obviously installed a particularly nasty brand of trojan, and make Windows Defender put the executive I had just compiled back.
But really, I deserve this for using a Microsoft natural keyboard in the first place.