

Oh, okey. Yeah, I can live without that too.
Oh, okey. Yeah, I can live without that too.
Sadly it’s got achievements now
What did I miss? Does Linux has achievements now??
Agreeded. I remember a lot of posts being “Girls, what do you like with boys” and then the next post would be “Boys, what do you like with girls”. Rinse and repeat in some other flavour with more or less sex.
You see the same with people who use fillers or get tattoos. They start small, only one tattoo or a minor increase in lip size. Then they get another and another tattoo, or get bigger and bigger lips. My hypothesis is that they get used to the new appearance or becomes desensitized to it.
one-liner posts
I feel like Ask Reddit is at fault for that one. They changed their rules to have the entire question fit in the title. Before that, you were allowed to have the question expanded upon in the post.
The title made me think 244 children (and not offenders) were arrested.
THANKS! I will try to do this this weekend (kids and all, might not have the time. :-) )
“hands-on” graduation project
Does hand-on mean supervised?
It is still probably one of the better ways to manage your passwords short of using a password manager. I don’t know any hackas but it feels like a lot of effort, finding patterns in a list of passwords. When you have found a pattern, you must also figure out what the pattern is.
On the other hand, it could be a viable way given that there are some huge leaks with a lot of data. Perhaps someone is selling datasets of hacked patterns, it could be another way to find someones paypal password.
Accidental reply
created by deleter
I don’t use Google, but perhapas I should? You could make a bingo game out of finding funny summaries like that one.
From what I understand, they (hackers) try known email/password combinations at different sites because a lot of people reuse their passwords. I also find it unlikely that anyone trying hack accounts will spend any amount of time looking at individual passwords if their list is 1000+ (and we know there are leaks in the milions).
I agree that they are reasonably save unless they are targeted.
Bump. I also want it.
Why not? It’s not going to be cost effective to discard a usable computer, of course. But hen your phone can be hooked up to a monitor, mouse and keyboard and the phone’s internet can be used to stream the remote computer, why have a computer? Or if your phone could give you the same interface as your current computer?
I will personally most likley always own a “ordinary” computer, but I wonder if a majority of the populace will.
More like remote desktop, like your whole computer being cloud based.
https://en.wikipedia.org/wiki/Desktop_virtualization and https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-virtual-desktop-infrastructure-vdi.
I haven’t seen The Expanse, but I get it from context. I still believe that is how a lot of people will operate in when 5G is wide spread enough in the US (because that is most likely where the money to develop this will come from and hence the first target market. Or perhapas somewhere in Asia.) + 5 years to develop and sell products.
Unless I am completely wrong and some other trend comes along and the tech world takes a whole other course. 🤷
How do you know which headers to set? I couldn’t find any documentation when I last tried (but that was some years ago now).
I wonder if not computers will move away from being a physical unit and instead being a cloud service. The smartphone will be the access point for your cloud computer, and you will connect it to peripherals, just like you would a laptop today.
I am currently looking into borg because it can take incremental backups. I just need figure out how I should handle a running system, if I need to turn of all my docker images or if there is some kind of snapshot function I can use.
From what I read on their FAQ, Borg cannot verify the integrity so I would need to turn everything off during the backup process. A filesystem like ZFS could have solved that problem (cannot find the link, something about shadow copy I think?) but since I don’t have a backup yet nor physical access, I need to work with what I have.
I think I will set it to take a backup every night.
EDIT: Maybe it can verify integrity? Still trying to find information on my use case. https://borgbackup.readthedocs.io/en/stable/usage/check.html