Hacker News new | past | comments | ask | show | jobs | submit | arthurfm's comments login

There was a car dealer in the UK that had a buy one, get one free offer on the Dodge Avenger SXT in 2008. [0] Apparently there are only 107 left of that particular model on UK roads, with a further 36 cars classed as 'SORN' [1][2]. I reckon the latter are being used for parts.

[0] https://www.theguardian.com/business/2008/nov/08/automotive-...

[1] https://www.howmanyleft.co.uk/vehicle/dodge_avenger_sxt

[2] https://www.howmanyleft.co.uk/vehicle/dodge_avenger_sxt_a


One of the easiest ways to do this is to use a HDMI display emulator [0]. Set the resolution to 1920x1080, move the content or presentation you want to share to the 'ghost' monitor and then share the entire second screen in your meeting app [1].

[0] https://www.amazon.co.uk/s?k=display+emulator

[1] https://youtu.be/RA-XXvFHgEs


I honestly don't know if I want to be delighted or horrified by the need of a physical hack to trick your OS that there is a virtual monitor to share


Could the pool owners simply stick a hot and cold tap at one end and claim it is a large bath and not a swimming pool to avoid paying the tax? :)


Wendover Productions posted an interesting train-related video recently.

https://youtu.be/qQTjLWIHN74?t=466

It would appear that the issues with Amtrak can be traced back to freight rail as well. See 07:46 onwards for more details.


Very interesting, indeed. The issues in this video with the track issues ... what a shitshow.


Huawei's MateView 28.2" monitor too. It has a 3840 x 2560 resolution (which is slightly more than the 2560 x 2880 resolution of the LG DualUp), although sadly is not VESA mountable.


Linux Foundation unveils Sigstore — a Let's Encrypt for code signing [1] [2]

> The Linux Foundation, Red Hat, Google, and Purdue have unveiled the free 'sigstore' service that lets developers code-sign and verify open source software to prevent supply-chain attacks.

> As demonstrated by the recent dependency confusion attacks and malicious typo-squatted NPM packages, the open-source ecosystem is commonly targeted for supply-chain attacks.

> To pull these attacks off, threat actors will create malicious open-source packages and upload them to public repositories using names similar to popular legitimate packages. If a developer mistakenly includes the malicious package in their own project, malicious code will automatically be executed when the project is built.

> To prevent these types of attacks, 'sigstore' will be a free-to-use non-profit software signing service that allows developers to sign open-source software and verify their authenticity.

> "You can think of it like Let’s Encrypt for Code Signing. Just like how Let’s Encrypt provides free certificates and automation tooling for HTTPS, sigstore provides free certificates and tooling to automate and verify signatures of source code."

[1] https://www.bleepingcomputer.com/news/security/linux-foundat...

[2] https://www.sigstore.dev


Coming Soon™

Not available to us plebs and vague enough that it isn't even clear if they provide Windows-compatible code signing certs.


> I have second-hand but reliable information about their security approach, and "laughable" doesn't begin to describe it.

Back in 2017 a security researcher found 40 zero-day vulnerabilities in Samsung's Tizen OS. [1][2]

[1] https://arstechnica.com/gadgets/2017/04/samsungs-tizen-is-ri...

[2] https://www.vice.com/en/article/xy9p7n/samsung-tizen-operati...


> it was impossible to get the Series-X in the UK in the lead up to Christmas without paying scalpers

Not completely impossible. I managed to purchase an Xbox Series X directly from Amazon UK on 20th December. Amazon also had sufficient consoles in stock they were able to not run out for more than 12 hours [1].

[1] https://www.theverge.com/2021/12/23/22852161/xbox-series-x-a...


> how do you even "bin" something like this?

Number of bad sectors per drive?

https://www.reddit.com/r/DataHoarder/comments/4ingu0/how_man...


In Edge Canary, Dev or Beta, go to:

    edge://flags/#edge-enable-super-duper-secure-mode


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: