• 6 Posts
  • 24 Comments
Joined 1 year ago
cake
Cake day: June 17th, 2023

help-circle





  • In about 2014 we flew through an airport where some of these “customs” types shows was being recorded. They had signs up everywhere (I think in multiple languages) saying “episodes of _____ are being recorded here. If you do not wish to be recorded please talk to the crew” (or something like that).

    But who knows what they’ve filmed for their cut-away shots, from the far said of the arrivals hall.

    I guess you should expect shots of you walking to be ok. But probably have the right to opt out of having your “case” filled.


  • I worked at a take away shop in Australia (a Ma & Pa shop that sold fish, chips and pizza). The store was always closed on a Monday but the owner and a couple others would usually come on to do orders and prep.

    The main lights were always off and the chairs are stacked near the door so you’d have to push past them to get in. But every time, without fail we’d still get a half dozen people pop their heads in and asking “are you open?”.

    One day, the owner sliced his hand badly and had to rush to hospital. They took off so fast they forgot to lock the door and left the place unattended.

    When they got back (very late at night), there was precisely one drink missing from the fridge, and $3 left on the counter.






  • Yeah, it depends on what you mean.

    In many cases malware and phishing is hosted off other compromised sites. So, they build a list of Wordpress sites with vulnerabilities, and use the vulnerabilities to host their files on them. For example, imagine “legitimate-medical-site.net.com” is a real site. The attacker will use the exploit to upload malicious files in there somewhere like “legitimate-medical-site. net. com/qwertasdf/invoice.pdf”.

    If the site gets blocked or shutdown it’s no loss to them.

    Another technique, especially phishing wise, they will have a semi-plausible domain name (e.g. youbank-security-server .con). But they will register heaps of these. There are tonnes of top level domains that do next to no checking. These things cost a few bucks, so having it taken down is not a problem.

    The combination of burner sites and domains mean they have a window of opportunity to run their attacks and scams before other protections kick in.


  • We’ve had many of these. We just leaver up the boards and tear them out.

    You could plunge cut with a circular saw along the edge. Then work a chisel under it and just tear out the floor boards any way you can.

    Then for the screws, I either tear them out with pincer pliers for the shallow ones (you can get decent leverage with pincer pliers). Or just cut them flush with the joists and leave them there (quick work with an angle grinder and cut-off disc).

    PS. Sorry been trying to reply to you for a few hours but my client wouldn’t connect.




  • Lexx is wild. I watched it originally on a pay tv channel that had cut the episodes up into ~25 minute blocks.

    I first dropped into late season 2 and occasionally I’d miss an episode.

    So, combined with the weird cutting, the no context and the standard Lexx craziness, I had NO idea what was happening. The whole thing was a fever dream. Highly recommend!

    I actually think it’s was the best way to watch it first go round! Then, when I came back and do the whole series in order and it was almost as much of a surprise.