You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !programmerhumor@lemmy.ml
Post funny things about programming here! (Or just rant about your favourite programming language.)
Rules:
Posts must be relevant to programming, programmers, or computer science.
No NSFW content.
Jokes must be in good taste. No hate speech, bigotry, etc.
Imagine playing a shooter over a network using this protocol.
FPS by mail
I only torrent over IPoAC.
Government drone birds can handle surprisingly large amounts of data.
But also super high throughput.
Routing information protocol, little pigeon, routing information protocol.
So it’s obviously not a sneakernet. Is it a wingnet?
The protocol is highly susceptible to DOS attacks by means of BB guns, slingshots or, for more sophisticated hackers, trained hawks.
“Unintentional encapsulation in hawks has been known to occur, with decapsulation being messy and the packets mangled.”
Or more sophisticated hawks