Sparkega

joined 2 years ago
[–] [email protected] 4 points 1 year ago (1 children)

I’ll give you a piece of my mind.

Just kidding. Thanks for the correction

[–] [email protected] 63 points 1 year ago (4 children)

Eliminates a malicious threat vector. Gives you piece of mind to charge your devices without worry that what you connect to is going to interact with your device.

[–] [email protected] 4 points 1 year ago

Give Swindon a chance.

[–] [email protected] 1 points 2 years ago

Thanks for the recommendations! The only one I don't have already is Slime Rancher, which was 75% off!

[–] [email protected] 5 points 2 years ago

That's probably more accurate.

[–] [email protected] 5 points 2 years ago (8 children)

Any recommendations?

[–] [email protected] 0 points 2 years ago (2 children)

That's good but I still don't believe it.

[–] [email protected] 2 points 2 years ago (1 children)

Which game is that? The only one that came to mind was American McGee's Alice but that's a third person shooter.

[–] [email protected] 11 points 2 years ago (1 children)

I experienced an instant game over a couple hours in on my first playthrough on the crashed nautiloid. When I found the wounded mind flayer, I tried to peer into his mind and failed the roll leading to him overpowering me. I became a thrall while Asterion and Shadowheart watched. No option to revive during the cutscene.

[–] [email protected] 2 points 2 years ago (1 children)

Wow, 13k total miles when that's how much an average American drives in single year nowadays.

Definitely got used for other purposes.

[–] [email protected] 23 points 2 years ago

I'm 2+1 and tested positive for COVID last week. Immunity wanes.

 

Researchers analyzed 190 million hacking events on a honeynet and categorized the types of hackers into Dungeons and Dragons classses.

Rangers evaluate the system and set conditions for a follow-on attack.

Thieves install cryptominers and other profiteering software.

Barbarians attempt to brute force their way into adjacent systems.

Wizards connect the newly compromised system to a previous to establish 'portals' to tunnel through to obscure their identity.

Bards have no apparent hacking skill and likely purchase or otherwise acquired access. They perform basic computer tasks.

view more: next ›