Editing 1678: Recent Searches
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 57: | Line 57: | ||
; autoexec code posted by verified twitter users. ('''Title text''') | ; autoexec code posted by verified twitter users. ('''Title text''') | ||
: The term "autoexec" refers to code that runs automatically, usually during boot, and derives from one of three boot-time files for {{w|MS-DOS}}: AUTOEXEC.BAT, CONFIG.SYS and COMMAND.COM. AUTOEXEC.BAT would typically contain commands for customizing the command prompt, loading additional drivers, and/or automatically launching a program. | : The term "autoexec" refers to code that runs automatically, usually during boot, and derives from one of three boot-time files for {{w|MS-DOS}}: AUTOEXEC.BAT, CONFIG.SYS and COMMAND.COM. AUTOEXEC.BAT would typically contain commands for customizing the command prompt, loading additional drivers, and/or automatically launching a program. | ||
โ | :Automatically executing code from the Internet is generally a terrible idea, because it could be written by someone with malicious intent and harm your computer. The joke here is that the code would only be executed if written by someone who has been "verified" on Twitter. Twitter's verification service | + | :Automatically executing code from the Internet is generally a terrible idea, because it could be written by someone with malicious intent and harm your computer. The joke here is that the code would only be executed if written by someone who has been "verified" on Twitter. Twitter's verification service only serves to show that a user is who they claim to be, not whether or not their code can be trusted, so this would provide little protection. Usually, Twitter verification is used by celebrities so they can be distinguished from people claiming to be them. The line implies that Randall is only interested in running code posted by celebrities. |
:Most code downloaded from authentic sources (such as Microsoft and official Linux distributions) is verified by a cryptographic signature from a true trusted source, authenticating the origin of the software. These may include software updates that run automatically in the background. The joke here is that the term "verified" means very different things between Twitter users and software distribution. | :Most code downloaded from authentic sources (such as Microsoft and official Linux distributions) is verified by a cryptographic signature from a true trusted source, authenticating the origin of the software. These may include software updates that run automatically in the background. The joke here is that the term "verified" means very different things between Twitter users and software distribution. | ||
:Additional hilarity was added to this by circumstances in 2022 when, after [[Elon Musk]]'s takeover of the site, anyone could buy a visually identical verification symbol for $8. With a number of notable spoof/fake accounts being 'verified', it was potentially an even worse idea than it was in the first place โ not that all genuinely verified users could be trusted to be unimpeachable in this regard. | :Additional hilarity was added to this by circumstances in 2022 when, after [[Elon Musk]]'s takeover of the site, anyone could buy a visually identical verification symbol for $8. With a number of notable spoof/fake accounts being 'verified', it was potentially an even worse idea than it was in the first place โ not that all genuinely verified users could be trusted to be unimpeachable in this regard. |