![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/d3d059e3-fa3d-45af-ac93-ac894beba378.png)
You can cut one leg off an IC on the board and it becomes a regular barcode reader.
You can cut one leg off an IC on the board and it becomes a regular barcode reader.
It’s so bad.
Hugging, definitely.
Snuggling, maybe? Like maybe we both fell asleep in the back of a van and ended up snuggling a bit and when we woke up we’re not weirded out by it.
Wrestling, maybe, but it would probably be with kids or pets around. I can’t remember doing it but I wouldn’t be weirded out by it.
It wasn’t always this way though. I was raised southern Baptist. Becoming OK with male physical interactions and homosexuality was a journey, and I am much happier with how accepting I am now than when I said I was as a Christian who had this low-key hypocritical “I know the truth of god and accept everybody” while also looking down on sinners.
I have a gay friend who came to visit me and we went around the city and to a house party and had a great time and then fell asleep in the beach. The next day he said “that was one of the best dates I’ve ever been on” and it caught me off guard because I was just “hanging out”, but if it had been a girl, it would have been a great date, and I thought “ok, sure, it was a ‘date’ with a guy friend and that’s ok.” It was a big step for me.
Or a tui file manager like ncdu
If you’re scared to do rm -rf
, do something else that lets you inspect the entire batch of deletions first. Such as:
find .git ! -type d -print0 | xargs -0 -n1 echo rm -fv
This will print out all the rm -fv
commands that would be run. It’s basically rm -rf --dry-run
, but rm
doesn’t have that common option. Once you’ve verified that that’s what you want to do, run it again without echo
to do the actual deletion. If you’re scared of having that in your history, either use a full path for .git, or prepend a space to the non-echo version of the command to make it avoid showing up in your shell history (assuming you have ignorespace in your HISTCONTROL env var)
I use this xargs echo
pattern a lot when I’m crafting commands that are potentially destructive or change lots of things.
Everything is a remix. https://youtu.be/nJPERZDfyWc
If there is a redundant block then it will auto recover and just report what happened. Redundancy can be set up with multiple disks or by having a single disk write blocks to multiple places by setting the “copies” property to more than 1.
zfs is made for data integrity. I wouldn’t use anything else for my backups. If a file is corrupted, it will tell you which file when it encounters a checksum error while reading the file.
God exists and watches everything you do and loves you while threatening you with eternal damnation.
deleted by creator
thatsthejoke.jpg
I loved his music until he admitted that all of it was Al-generated.
I also loved it afterwards, but I loved it until then too.
deleted by creator
Talk to HR. If they are not responsive talk to a lawyer that specializes in workplace law.
Dude, you’re so not paranoid. This stuff has happened to me. I had a Wordpress blog that was hacked and the exploit was stored in the DB so even after reloading the OS I still was infected because I hadn’t sanitized my database. Luckily it was just Google search viagra spam, and it was a valuable lesson.
As many have pointed out, you don’t know that there is not a back door in your software.
One way to defend against such an unknown is to have a method of quickly reinstalling your system, so if you ever suspect you have been compromised you can reload your OS from scratch and reconfigure it with minimal fuss. This is one reason I recommend folks learn one of the configuration management systems like ansible or puppet, and use those to configure your Linux servers. Having config management also helps you recover anfter unexpected hardware failures.
Defense is done in layers. No one layer will protect you 100%. Build up several layers that you trust and understand.
This makes sense. When you use a copy-on-write block device, it is doing things below the level of the filesystem, so you have to use cow-aware tools to get an accurate view of your used disk space. For example, if you have two files that are 100% deduplicated at the cow-block level, they would show up as different inodes on the filesystem and would appear as using twice the space in the filesystem as they do on the block device. Same would go for snapshots and compressed blocks.
Seriously. What part of “BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.” do they not understand?
WASM made huge strides last year. You can run entire operating systems inside a WASM hypervisor now, and lots of packaging and transpiling projects came of age last year.
Some things cannot be replaced. Spez destroyed something wonderful. There’s no going back.