

Surely one could use the same exploit to restore the original boot code as the malware used to corrupt it
Pronouns: any. You can’t get it wrong
Surely one could use the same exploit to restore the original boot code as the malware used to corrupt it
Everything is under control
That says you cannot replace individual broken cells in a Tesla pack. That doesn’t say you can’t replace the pack
Aren’t all the cells worn in a ten year old battery?
My car wouldn’t have done that. Had I fallen unconscious it would either follow the road or stop
But that’s also not because it’s electric.
The best thing to do with a tarball is to bzip it
My government agency when hiring all the roles in an IT team put those sort of stupid ranges in the headline, but if you drill down to a specific role you see the actual range
So about 1d8 con damage instantly then 1d2 con daily.
Melee area effect weapons. There’s a wand of fireball in Balders Gate 3 that is bent and has melee range. This is like that, but the fire is only analogous to fire and the effect lasts longer and does damage slower
People also look at it as an example of how identifiable people are right now.
I don’t think the “us” in that furrie’s statement is inclusive of everyone
However, I would say when talking about Linux specifically, there is a high chance that people talking about stuff being broken are people breaking stuff.
I’m sure you’re right. It used to be complicated to set up printers, bluetooth, audio, but even then once set up they were fine. Now all those and just about anything else you need to manage on the machine has an easy GUI
My wife’s computer runs Linux and she’s never had to use a terminal (she’s not a techie type)
For the UDP broadcast, you should be able to catch and change them with simple firewall rules, you’d catch packets with a destination address of the broadcast address and send them to a chain that rewrites the destination
So throw an error at runtime on that macro, most workbooks aren’t the target of a macro
They said ~/
I don’t think there’s any protection for the current user’s home directory
That’s a bit much, perhaps though they should use a real mode OS
Yeah, there’s a Debian implementation of GNU/hurd. Debian recommend you run it in a VM
The Linux kernel (the part that gives Linux the name) is antithetical to Linux philosophy? I could understand it being contrary to GNU philosophy
I think you’d start in Capetown
It’s a pretty easy switch, the differences are all mirrored
It took me about an hour of driving to get used to the other way
I listen to music on a new music radio station - the good new music really stands out
Most people just like the (better bits of) stuff they listened to when they were young