Yeah I also never reached the end, though I imagine if playing multiplayer, with enough players and time, that then at some point there won’t be any untouched land.
Yeah I also never reached the end, though I imagine if playing multiplayer, with enough players and time, that then at some point there won’t be any untouched land.
I like my toots.
I don’t get the banana trick. What do I do after pinching? I just end up ripping through the skin of one while trying it out.
Or just always look at the 100g column.
Why does dumping water out of boots have instructions? Isn’t it like dumping water out of any other container?
Thanks for the warning.
You can search for communities across all federated instances by clicking on “All” in the communities page: https://lemmy.ml/communities?listingType=All
This one, if by unix he also means modern linux systems. Nowadays you can simply use tar xf my-file.tar.whatever
and it should work on most linux systems (it worked on every modern linux system I’ve tried and every compressed tar file I’ve tried). I don’t think it is hard to remember the xf
part.
(pretty sure they are talking about the scary book that is the Communist Manifesto, which is visible in the picture. I think it is about a ghost haunting Europe or something)
deleted by creator
What I find interesting is that my bank has kind of the opposite stance. It allows you to do a lot more things if you login via their website and I think they overall trust your actions more if you do it over the browser, but you are required to pass a lot more security checks, while on the app a PIN is enough, but it also doesn’t allow you to do as much.
I wonder what sort of mitigations we can take to prevent such kind of attacks, wherein someone contributes to an open-source project to gain trust and to ultimately work towards making users of that software vulnerable. Besides analyzing with bigger scrutiny other people’s contributions (as the article mentioned), I don’t see what else one could do. There are many ways vulnerabilities can be introduced and a lot of them are hard to spot (especially in C with stuff like undefined behavior and lack of modern safety features) , so I don’t think “being more careful” is going to be enough.
I imagine such attacks will become more common now, and that these kind of attacks could become very appealing for governments.
You all look dumb when dancing.
lemmy.ml is definitely not for you, but you will most surely find another instance accepting you on https://join-lemmy.org/instances. If you don’t find anything that suits your needs you can also run your own instance.
Linux is the kernel, not the OS. RedStar uses Linux as the kernel.