And for context, it does this because cheaters are willing to run cheats that run at that kernel level, and the only way to detect and prevent them is if the anticheat is in your kernel first.
And for context, it does this because cheaters are willing to run cheats that run at that kernel level, and the only way to detect and prevent them is if the anticheat is in your kernel first.
Correct, though to be pedantic anyone can be a CA- you just generate a cert with the right bits to say it’s a ca certificate and then use it to sign any other certificate you want.
But the only devices that will consider your signature worth anything are ones you also install your ca certificate on. So it’s useful and common in internal networks but isn’t really what is being asked here.
The hard part is getting in the root CA store of operating systems and browsers. As far as I know they are all maintained independently with their own requirements.
i didn’t downvote but imo it is light on data. having some more info on methodology would help, like where did the data come from? was there any normalization or other processes?
It’s hard to know if this is a map of words used most in an area relative to how little it’s used elsewhere, or just most common? or just…cherry picking slang that isn’t actually commonly used but is from that area?
then I would install one
just say I help improve ad blockers on YouTube and refuse to elaborate.
They don’t provide stuff for free, they provide stuff in exchange for your data and to sell ads.
rather than allowing edits for invisible edits for X minutes, couldn’t your client just delay actually sending it for X minutes allowing to cancel or edit freely until that point?
Gmail allows a similar feature and it seems safer in a distributed system than relying on everyone else to respect what happens after you send a raw message and an edit right after
The average user uses sleep mode and wakes from sleep. Sleep mode should be under 10w, or around $1/mo.
though laptops are notorious for proprietary charging.
I’ve seen dells that can charge via USBc at full 140w but only on a Dell dock. On any USB PD charger it will only do 60w, and complains about it as it throttles everything.
well yes, but it’s profitable because customers continue to buy their products and services.
the problem with blaming companies is none of them do this out of desire to hurt the environment. they do it to meet customer demand.
as an example imagine if we all stopped buying gas from Shell. their environmental impact would plummet…and their competitors impact would go up as we continue to buy the same amount of gas from other companies
growing it like a garden is a perfect phrase imo
because on windows or Mac it may have just worked. …until it doesn’t, or leaves your windows scaled wrong or placed on monitors that don’t exist or some other failure condition. at which point you reboot and hope for the best.
when it doesn’t work on Linux I’d check logs, actual configuration, and even the source if I need to.and then I’d hopefully improve things and make it work the way I want it to.
it sounds like you understand the value of using water to clean your butthole after you poop… so why not spend the $30 on a bidet just in case you ever do have a poop and don’t want to shower? or hell just so you don’t use as much TP before hopping in the shower. or for anyone else using your toilet and not wanting to hop in the shower…
there’s also the impact of having less consistency in hours. i.e if I work Friday and don’t work Monday but am blocked waiting for someone whondoesnt work friday…it’s waiting until Tuesday.
would Americans even consider that taking down the internet? It wouldn’t impact a US client talking to a US server.
using pet names, titles, or other things like that are useful in media when you want to convey the relationship.
Like when a movie has a man greet a woman. If he just said ‘hi jill’ you wouldn’t know who she is to him. If he says ‘hey babe’ you assume they’re in a relationship.
So idk what is actually more common in real situations but it’s easy to assume people only use pet names when you’re not going to see anyone’s actual one on one conversations
even just knowing enough to not consider clothes ruined when a button pops out or a tear forms would be nice
…any tips on getting in? I tried checking the store page to see if any friends have it and none of mine do 🙁
If adopt systems then the question is easy to answer: no, journald does everything you need.
without adopting systemd… well. Are you evaluating going without any log handling at all and maybe just dumping logs ephemerally to tty0? DIYing all log stuff like your init scripts DIY things?
Personally if I had to go without journald I’d probably go back to using syslog-ng. But I guess there’s an argument for shipping straight into something like opentelemetry-collector if you’re willing to put in a lot of work.
I dont have any specific llms to recommend but if you do want to go that route you could always run it remotely through something like Google collab.
But I don’t know if I would trust the results of an llm doing this as any mistake would make your entire resume untrustworthy