

I once commented on a pancake recipe post. The recipes they posted were weak but I deleted mine when I learned about the rule. It felt very much like the image here lol. Oh well
I once commented on a pancake recipe post. The recipes they posted were weak but I deleted mine when I learned about the rule. It felt very much like the image here lol. Oh well
If hypocrisy was poisonous we wouldn’t have these problems
Looks like cuda or cpu, and i just bought a radeon card.
That tells you that he’s insecure about himself
I just had to purchase a vehicle. My insurance company basically asked me not to buy a KIA or Hyundai and warned that the premiums for those makes were super high.
At this rate I bet it’s cheaper for them to Uber everywhere.
I’ve been wondering if there’s some kind of notification code that let’s the bad actor know they’ve successfully infected someone. Otherwise what’s the plan, trawl the entire IP space for devices your key can access? Wouldn’t it need UPNP or some other method to reach most people’s systems?
Didn’t it also get into Debian testing and Sid?
Apparently I’m not up to date. I’ve been impressed by some things and turned off by others. But I haven’t seen any workflows or setups that enabled access to my file system. How is that accomplished, and are there any safeguards around it?