Themosthighstrange@lemmy.world to Lemmy Shitpost@lemmy.world · 3 days agoIt's already runninglemmy.worldimagemessage-square98linkfedilinkarrow-up1956arrow-down124cross-posted to: programmer_humor@programming.dev
arrow-up1932arrow-down1imageIt's already runninglemmy.worldThemosthighstrange@lemmy.world to Lemmy Shitpost@lemmy.world · 3 days agomessage-square98linkfedilinkcross-posted to: programmer_humor@programming.dev
minus-squarechatokun@lemmy.dbzer0.comlinkfedilinkarrow-up1·2 days agoHonestly similar things can be said of windows systems, though there are some exploits that get through. Most do rely on the person launching having admin rights.
Honestly similar things can be said of windows systems, though there are some exploits that get through. Most do rely on the person launching having admin rights.