this post was submitted on 10 Apr 2025
220 points (85.7% liked)

memes

14160 readers
3005 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to [email protected]

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/AdsNo advertisements or spam. This is an instance rule and the only way to live.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 3 days ago (3 children)
[–] [email protected] 3 points 3 days ago (1 children)

I personally use it to make art for my FOSS game I make as a hobby.

[–] [email protected] 1 points 3 days ago (1 children)
[–] [email protected] 2 points 3 days ago (1 children)
[–] [email protected] 1 points 2 days ago (1 children)

Looks like the video on the homepage is broken? But looks awesome!

[–] [email protected] 3 points 2 days ago

It's some itch nonsense with different browsers. Try another browser but the video is not so important

[–] [email protected] 6 points 3 days ago

Me, personally? Nothing. Prefer to go without AI.

[–] [email protected] 2 points 3 days ago

Not OP that you asked, but I've used ai before to examine netflow data at the head of a medium sized network and identify malicious traffic via netflow anomaly, rather than the signature based methods that are used by current network intrusion detection systems. It's effectiveness is contingent on having good data that contains labeled malicious packets to train on, but it was pretty dope in lab conditions to watch a graduate ethical hacking class try to compromise my testbed network and my best performing ai powered intrusion detection algorithms were able to accurately flag something like 90% of the malicious traffic.

If we had an organization dedicated to creating like a modern version of the NSL-KDD dataset every 6 months or so I think this type of network intrusion detection system would be extremely effective.