It’s actually becoming increasingly clear that there is no replacement for Biden. We have polling data now and none of the other options come close to Biden.
It’s actually becoming increasingly clear that there is no replacement for Biden. We have polling data now and none of the other options come close to Biden.
That’s what most exploit-based hacks are. A developer makes a dumb mistake and then someone exploits it to do something they shouldn’t be able to do.
They got 13% of the vote, even if they didn’t win many seats.
Do you people really not realize that the Republicans control the House?
Because the Democrats have not had an actual majority since 2010. The closest they got was 2020-2022, but two senators ended up being traitors who were bought out.
I’ve seen plenty of the usual suspects complaining that the IRA didn’t do enough despite it being the largest green energy bill ever passed.
Yes it is. That opportunity passed in 2022 when the Dems lost control of the House.
Ok, but to do this, the Dems would need a blowout election in their favor. They would need to retake the House and have a commanding lead in the Senate so that they can get this passed even with a couple turncoats.
Biden isn’t a fascist and neither are the people he appointed. Even if he gave an illegal order, it wouldn’t be followed because his administration isn’t stocked with incompetent lackies chosen for their loyalty alone.
He’s accomplished more than Obama in half the time, not that that’s saying much.
Microsoft has always been like this. They’re a giant company with a bunch of silos that act independently and often undermine what each other are trying to accomplish.
USB devices have a hard coded vendor identifier and product identifier built into them that are issued from a central authority. The ones I saw were easily identifiable as not legitimate mice.
I’ve been the one identifying the people who use jigglers. Usually it was a manager coming to us to look for a reason to fire a poor employee or a contractor trying to bill a suspiciously large number of hours for the work produced. If it was just poor performance, HR would make us do a PIP and waste 3 months on them. Violating security procedures and falsifying time sheets was an immediate termination. And for the contractors, you need evidence in order to refuse payment.
Btw, if you want to get away with it, don’t use a software or USB one. Get one that interfaces with a regular mouse. Modern cybersecurity software logs every process executed and device connected.
There’s this little event happening in November that can change things.