I know it’s a joke, but why would a shapeshifter 350 years into the future on a planet 50 lightyears away be guilty of any of the same prejudices that our local cops are?
I know it’s a joke, but why would a shapeshifter 350 years into the future on a planet 50 lightyears away be guilty of any of the same prejudices that our local cops are?
Here’s a language that does bash and Windows batch files: https://github.com/batsh-dev-team/Batsh
I haven’t used either tool, so I can’t recommend one over the other.
Ha, abusing fork
for asynchronous saves is clever. I hope they are aware of the following restriction:
After a fork() in a multithreaded program, the child can safely call only async-signal-safe functions (see signal-safety(7)) until such time as it calls execve(2).
That’s absolutely true. What’s hard and what’s easy in programming is so completely foreign to non-programmers.
Wait, you can guess my password in under a week but you can’t figure out how to pack a knapsack?
Right? That’s the thing. Car thieves don’t care if the tool is illegal; they’re already planning on stealing a car.
If you make the tool illegal, you’re just making it harder for security experts who do care about the law.
Yes we should allow them, because the problem isn’t that this tool is available. The problem is that cars and other devices aren’t more secure.
If you broke into a bank vault with a screwdriver, you don’t ban screwdrivers; you get mad at the bank.
Any tips for painting fur? I’m going to be doing a few soulblight gravelords after I’m done this army.
Thanks! It’s way too many layers of wraithbone, with liberator gold trim, and seraphim sepia over top.
Been working on some Blood Raven Aggressors lately
You use cards for offline authentication (bars/festivals/etc.), and use a different process for online authentication.
Proving someone has the physical card in their possession (which is what a reader does) isn’t really useful for proving identity when you can’t also check the picture.
Pine and BeagleBoard have some decent options, but they’ll always be more expensive than rpi because of the economy of scale.
This doesn’t hold. Commit signature is a feature of git itself, even though the article chooses to focus on GitHub. And afaik github integration of signatures doesn’t break code hosting elsewhere, GH merely allows you to register your GPG signature with them so they’re able to validate the commits, but the author is still able to enroll the same GPG key to other hosts.
Not only that, but GitHub rewrites signatures on rebase (and sometimes on fast forward merge) with their own private key. Using signatures on GitHub is basically pointless.
There’s https://foundation.mozilla.org/en/privacynotincluded/ for privacy, at least.
https://en.wikipedia.org/wiki/Ares I think? Don’t understand the quotes though.
Should’ve been, “It was a mistake, in Heinzsight.”
The real interesting debate is between ((f) 1)
and f()(1)
.
Sounds like you need a sleep timer of 30 minutes
A VPN does this, but for your internet connection:
I’d rather take a plaster mold of my face than have to use a specific phone to order a VR headset.