I don’t mind seeing vids with small numbers (many are genuinely cool) but I avoid 500k and above (except music) because the mainstream is mostly clickbait.
I don’t mind seeing vids with small numbers (many are genuinely cool) but I avoid 500k and above (except music) because the mainstream is mostly clickbait.
Literally ISO
https://www.iso.org/obp/ui#iec:grs:60417:5988
And yes, we use switches but the lower network layers abstract that away and a LAN is still like a single bus on the network layer and up.
It’s a joke, note the conflation of port (physical connector) and port (one of 65536 virtual TCP/UDP pathways for applications). Also, HTTP(S) (port 80 or 443 by default) is literally “Hypertext Transfer Protocol” so it’s fair to say it was designed to carry HTML.
What is the <-->
port for? HTML? I thought that was port 80 or 443…
It’s an LLM, for fuck’s sake. Are they just going after buzzwords? I don’t want to talk with the car about what the best (paying most for Google Maps placement) pizzeria around is, I’ll decide that before the cab arrives. Just let me pick the address or coordinates in the app and shut up.
Do it. The crimes are almost entirely by him personally, and had unprecedented damage. He should be responsible with all his money - a Twitter-sized blow would be a slap on the wrist as the platform is worth just $5B or thereabouts.
TL;DR: Set your account to “private”
No alternatives to ex-Twitter are mentioned. Lame.
The social security card says it was issued to “ELON MUSK” but my name is “Elon Musk”. Direct all these supposedly mine tax bills to “ELON MUSK” and leave me alone.
Imagine if Intel snapped and disabled Stephen Hawking’s wheelchair and computer, and he needed to pay for a new one with a different voice, absolutely helpless without it.
If you’re using xkb
, try this guide. Of course, backup any system files before modifying them, and just to be sure, add a 2nd keyboard layout as backup and know how to switch between them to have a fallback if you corrupt the primary one.
There might be TUI or GUI tools too, probably way more convenient for a one-off change on a single PC.
I just changed one of the existing layouts. Very easy in any text editor, you just need to find the proper name or Unicode code for each function/character.
Nope. But I guess a mirror of WebAssembly Studio would still be the best starting point despite its slow development lately. The WAsm plugin for VSCodium was broken for me too.
Note that unlike JS, WASM won’t run from file://
URLs; you need to run a local http server or commit to an online repo to run your code. There might be an about:config
option to change this but many IDEs (incl. WA Studio, presumably) come with servers for this reason.
A forgotten one is webassembly.studio, an in-browser IDE for creating WASM projects with way less pain than other methods. It got discontinued the year I needed it for my school project. It was open source but I failed to rehost it myself and public mirrors only appeared after I spent days trying to make Emscripten work, tore my hair out over WebGL and then finally painfully built the whole thing with CSS (and a bit of JS; yes, it was indeed a disaster).
Google has. The Zürich university fella needed his own data classification monkeys.
Trojan is any malware that pretends to be a legit program. It does not need to have backdoor or info stealing capability even though most malware (trojan or not) today does. For example, pre-Internet trojans might just invisibly install themselves along the actual program they were bundled with and then nuke the system on a certain date. Antivirus companies would even advance the date on their systems in hopes of detecting these and being the first to develop a patch.
But since this program is not malicious, it just straight up hogs system resources and/or crashes it due to a mistake, it cannot be considered malware and therefore not a trojan.
Certain Intel processors from around 2000 would crash everything when loading the 4 bytes F0 0F C7 C8
into a specific register. Would you consider this a backdoor because it allows any program to crash the system? I wouldn’t say so, crashing Windows 98 was probably not too hard anyway…
I installed FakeStore and set the app’s relevant /data/system/packages.xml
properties from Aurora Store to FakeStore (installer="com.android.vending" packageSource="0" installInitiator="com.android.vending"
, the same as Google Play Store) and rebooted, which was enough to fool the public transport app I’m using. Is this the workaround you’re talking about, or does it require MicroG too?
It’s the apps that prevent themselves being sideloaded. Presumably, their devs will enact similar policy on EU iOS too.
…Like MS-DOS getting open sourced. It’s pretty much worthless unless you need to use some really old device.
It’s a minix clone, so… mimix?
“Trust me, you just need to buy more compute for your car. We’ll figure out reliable driving by sight someday.”