

Looks like the ejector switch. Imagine trying to scratch your balls mid-mission and immediately shooting out of the plane pulling break-your-fucking-spine Gs.
I take my shitposts very seriously.


Looks like the ejector switch. Imagine trying to scratch your balls mid-mission and immediately shooting out of the plane pulling break-your-fucking-spine Gs.


Just install linux bro, it’s not that difficult. You’ll have to compile the F-35 drivers from source, but that’s just the cost of having a reliable system.
I saw a PT Cruiser once and immediately adopted the same opinion.
In one word: no. In more words: some addressing methods can lead to privacy and security issues, but those aren’t widely used anymore.
IPv6 addresses can be assigned to interfaces by several systems. One of those is SLAAC, or stateless address auto-configuration (comparable to APIPA and the 169.254.0.0/16 address space for IPv4). One method by which it generates globally unique routable addresses is by inserting the interface’s MAC address into the IPv6 address. Since IPv6 generally doesn’t use network address translation (and thus no masquerading), this would advertise your computer’s MAC address to the whole internet. More recently, SLAAC uses pseudorandom temporary (or “privacy”) addresses for interfaces, together with a unique network prefix assigned to the customer (analogous to the single public IPv4 address).
It’s also possible to assign IPv6 addresses statically or by using DHCPv6.


The survey is always offered only to a random subset of Steam users. The results only ever represent the fractions of users who took the survey, and are not representative of the entire Steam ecosystem as a whole. Unfortunately, this means that the increase/decrease in Linux usage is probably within the margin of error and is not a reliable statistic.
The person behind their twitter account is a notorious shitter.
It’s better to delay it and release an immediately usable product than to break the desktop when an unexpected bug is encountered and make the computer unusable. I’ve never transitioned a desktop environment and framework to an entirely different display system, but I don’t imagine it’s as simple as flipping a switch.
Mint is not a bleeding edge distro. Reliability should come first, always.
It’s the objectively correct choice, but it might draw the ire of Fedora stans.
Try this thread: https://community.home-assistant.io/t/kiosk-mode-for-raspberry-pi-with-touch-display/821196
We use PiSignage at work for the overhead displays. It’s basically Debian stable with the Labwc compositor and a single Chromium kiosk mode window that opens automatically to a local web server.
IIRC, that specific island is downstream from the spillway of a reservoir dam that is opened periodically. When it opens, the island gets flash-flooded. The opening is preceded by eight siren blasts.
The idea of that much water approaching at that velocity puts the fear of God in me.


I take ONE DAY away from this gods-forsaken website…
It’s problematic, but possible: https://jamesguthrie.ch/blog/multi-tailnet-unlocking-access-to-multiple-tailscale-networks/
If the other person has a Tailscale account, it sounds like the most expedient method is to simply invite them to the tailnet as a non-admin user with strict access control.
You could share a node with an outside user, but I don’t know how much the quarantine would affect its functionality. You could also use Funnel to expose the node to the internet (essentially like a reverse proxy), but there are obvious vital security considerations with that approach.
trash-cli is your friend.
No leaving before you git push, you’d better start working on those merge conflicts!


The treekie in me wants BookData.
(edit) This made me remember The Measure Of A Man and now I’m fucking depressed. They had such high hopes for the future.
Fuck, I’m an idiot. I really shouldn’t be giving advice when I’m sleep-deprived like this. I completely forgot that when I used RDP, I did it through an SSH tunnel.
Removed.
deleted by creator
Some of them will. It depends on which rootkit is used. There are some VM optimizations that applications can detect, but those can be disabled.
About fucking time. I’m proud to say that I’ve contributed to this outcome.
I’m gonna go dance in the street now.