No. You will get scammed with zero recourse.
This is a secondary account that sees the most usage. My first account is listed below. The main will have a list of all the accounts that I use.
Personal website:
No. You will get scammed with zero recourse.
This again! Are you trying to program this image into my long term memory?
I was hoping for FreeBSD.
Is this related to the ermm convention going on right now in Orlando?
This is awesome! I didn’t know this was a thing.
Polling? I don’t even know what that word means. I only know Vote!
Imagine what? What was this comment again?
🤢
… eww
Right but wow I didn’t want to imagine that.
It’s beautiful.
It would also require effort and a degree of hand-eye coordination not typical for those in his age group with his degree of mental deterioration.
This isn’t even necessarily for nefarious reasons. I’ve actually had a case where HR was trying to help by putting in the words that they were stupidly required to find in a resume.
Still not a good sign of a properly functioning organization.
That’s a tough nut to crack. Even as a video game platform, they don’t write most of the software that they sell today. They would need to find some way to convince developers to write software for something that’s not the platform nearly all users are running.
I’m not sure that Microsoft ever did halt going down that path. My wife recently bought a PC that came locked down by default and required some fiddling to allow running unsigned apps. This was Windows 10, not sure about 11.
I think it could be more that broad compatibility with everything is their main selling point, and by doing so they were undermining their own ecosystem.
However, this is mere speculation on my part.
Valve is a Titan doing incredible work for the open source community and making money while doing so.
Successful open source software business model at work. Way to go.
Priority inversion sounds frighteningly subtle. You might not notice you’re under the effects of the spell because it manipulates priorities rather than bends will directly.
It still feels like your intent, but you’ve been rendered massively ineffective and it may take ages for someone to suspect magical involvement.
My first thought was: that’s it? Really that little?
But we continued to use the substances anyway because it was cost-effective.
Page break.
Chapter 6: The First Mutant
What happens if I say it’s not OK?
This is good advice in general. Think of it like penetration testing. You really should verify what you can actually access remotely on a device and not assume you have any level of protection until you’ve tried it.
Log files can also contain signs of attack like password guessing. You should review these on a regular basis.