Man, what a grim screenshot for the app promotion.
Man, what a grim screenshot for the app promotion.
No, that’s the one where “everything that can go wrong, will go wrong”
You’re thinking of Godwin’s law
You may, but the only correct response is “puff… You’re a sandwich!”
Sudo make me a sandwich
Libreboot? Coreboot? UEFI?
There’s a Hebrew expression that goes like “Because of hatred of Haman , not out of love of Mordecai”
Adjusting for context , it is because of mistrust of Microsoft, not out of love of Linux.
It didn’t. FB still recognize my face when familly members post a pic with me My profile still exist, and so is the social graph.
I tried to log in after years of no use , to find a Delete all data" button - Can’t log in anymore (no password resets, no recovery process).
" You stopped using us, it doesn’t mean we will stop using you"
Got optic to SFP bridge from my ISP (only because I insisted on using my own router) , that was fed into SFP to RJ45 adapter that I have bought (via Amazon - apparantly the ISP’s have lobbied to not import it here) and then connected my router.
That went somehow ok untill I switched ISPs , now the optic cable is fed into an ISP provided decryption module , paired specifically to the mac address of my router.
It’s like the ISPs went onboard with upgrading to optic because they could excert more control over their customers.
What’s the catch? A free app on the play store that has acceess to all premium Netflix or Amazon content would be banned directly into purgatory.
Only seen it (FoxIt) installed in a corporate environment, because for some reason businesses cannot stop using “Interactive editable PDFs”.
I wonder if there are FOSS alternatives adressing that niche.
Can you break the sed command down for us sed newbies? The ‘-i.bak’ thing is throwing me off
Wouldn’t blocking it break some other functionality? I wonder if you could have a more granular approach where given a payload and endpoint, return a predefined result.
That way you could isolate the “am I on the latest version” requeat specifically.
50 years and counting.
Any day now…
Tell this to any 3rd party Apple repair store.
Now I really want to alias trust-me-bro to this. Actually I would totally do that (or the poweshell equivilant ) for Titus’s Windows 11 debloater
I don’t even get the first one. The download is malicious meaning the hosting site was compromised meaning the hash posted along with the download link is compromised too.
This dude, this dude procreate.
Do you know if it recognize tgz extension?
Assuming a stable URL
ffmpeg -i "(stream url)" -t (length of recording in hh:mm:ss format ) -c copy "recording.m4a"
And you could time it weekly using cron jobs
One could only hope