Im on a low budget build, should i get a RX 560 4GB or a GTX 1050 2GB(NON TI)?
The RX is only 15$ more expensive than the 1050 2GB. TI is almost 100 more,so i cant get it.
I still dont know which one should i get.
Java is indeed a pajeet language
>take a quick pic on my 2015 smartphone
>try to post to a 4chan thread
>filesize is too big
really? what fucking year is this?
you aren't still using java, are you?
I just opened my computer and it's very dusty, is this a problem? Do I buffed to clean it? Pic related is my pc
Meant to say "cleaned", posting on my phone right now and it changed the word.
Is it safe to vacuum it? Or will it break my pc?
With the exception of Java (fuck Java), What programming languages are worth learning in 2017?
Are there good and free (no pay) Protonmail alternatives? I am going to delete my account, because Protonmail has been compromised. They comply with Swiss anti-hate laws and are made by engineers from (((CERN))).
What are you working on, /g/?
Old thread: >>62431668
The most /g/ phone and yet you haven't contributed.
What happened to them?
What is the best cellphone i can get for under 300$?
I dont care to much about getting THE MOST POWERFUL phone there is for 300, just something that is worth its money.
Had a Motorola moto g before and i was quite happy with it.
will customs bust me if i import this or do these chinks know what theyre doing?
>IoT-focused security company Armis Labs revealed a Bluetooth-based attack that impacts billions of devices, including Android, Linux, and unpatched Windows and iOS10 or earlier devices. Along with the Bluetooth attack, which the company called "BlueBorne," Armis also revealed eight zero-day vulnerabilities that could be used to facilitate the BlueBorne attack against some devices.
>The BlueBorne attack vector has several stages. First, the attacker finds some local Bluetooth-enabled devices. Next, they obtain the MAC address of the device to determine which operating system is running on it and adjust the exploit accordingly.
>The attacker will exploit a vulnerability in the implementation of the Bluetooth protocol on that platform and then choose whether or not to do a MITM attack to intercept communications or take over the device for other malicious purposes.
How can android and linux even compete with apple?