

they might be talking about those questionably-legal licenses off ebay


they might be talking about those questionably-legal licenses off ebay


Dead Internet theory is becoming more than just a theory
You can do 4 just fine, it just looks goofy


sounds like fun, I should get this game when I get back from work


A friend dragged me into an extracurricular competitive programming when we were in school. Had to code in Pascal, of all languages.
Funny thing is, the first session was full to the point of people having to stand, a month or two later only 3 people attended, and that’s when it stopped.


“takes a conservative turn” - how to spot a journalist who learned about russia yesterday.


“It’s NoT iSrAeL iT’S jUsT nEtAnYaHu” smells very much like “It’s NoT rUsSiA iT’S jUsT pUtIn”.
I would tell my younger self to go to a psychiatrist and get some antidepressants about 2 years earlier than last time.
reverse psychology mm I like it


Outer Wilds. The universe is, and we are.
One of those games where it’s better to play absolutely blind. For the experience of discovery is the gameplay. You can never play it for the first time again.


And also the overwhelming sadness and abandonment of Martinaise, yet the life goes on despite.
This game didn’t cure my depression, far from it. But it helped me understand it and myself more.
Keed using it, set up smartd to check up on it regularly and send you an email if something goes wrong.


Do you want zombie apocalypse? Because that’s how you get zombie apocalypse.


I think the word you’re looking for is “funny”.
buy and maintain, it probably costs over $1M/yr in fuel and spare parts
doesn’t work for me in boost ):
I think it’s like this: what used to be group in regular permissions output is a union of group and ACL mask in ACL output. Mask sets the upper limit of what ACL can do, so if mask is rw- then it’s impossible to set a r-x ACL permission because allowing execution is not allowed.
This seems to be more geared towards enterprise environment where it could be complicated to cleanly define groups, since you can only give access to one you might run into a problem where dept. A needs access to that directory but also person G from dept. B and person K from dept. C.
If the traffic is encrypted, how would they know?