For such an invasive piece of code (it seems to drop into my system with every major Windows Update), this would be a hilarious message to see.
For such an invasive piece of code (it seems to drop into my system with every major Windows Update), this would be a hilarious message to see.
The patterns of behavior between shareholders, boards of directors, and executives is what’s killing people.
Sooooo… the target space has expanded?
At least the population of sociopaths would decline.
Well, most of the fridge is already there. You just need to disassemble, sandblast the metal and paint (if the paint is in poor condition), replace the insulation with closed-cell spray foam, replace the refrigeration system with a modern Freon-free system, reassemble and put new seals on.
An old fridge can be quite simple, structurally speaking. It’s in the 70s and 80s when fridges started getting compact, difficult to repair, and disposable.
The fridge will likely operate far less efficiently than a modern fridge unless you have it rebuilt.
With that said, a rebuilt fridge - with a more efficient cooling system and better insulation and all seals redone, etc. - does not cost significantly more than a new midrange fridge.
My microwave is a 1977 Amanda Radarange. It can boil a cup of water in ⅕ of the time a modern microwave can.
Now granted, it has zero fancy settings and a simple number pad that does nothing but set how long you want the microwave to run.
But honestly, this simplicity is a large part of it’s charm. No connectivity needs, no features locked behind paywalls, no extraneous bullshit or never-used features. Just a tool that does only one thing, and does it exceptionally well.
I have an apostrophe
Scottish/Irish?
some companies see it as a SQL injection hack and sanitize it.
Which kind of apostrophe?
A straight apostrophe, fine - that can and does get used in valid SQL injection attacks. I would be disgusted at any input form that didn’t sanitize that.
But a curly apostrophe? Nothing should be filtering a curly apostrophe, as it has no function or use within SQL. So if you learn how to bring that up in alt codes (Windows, specifically), Key combos (Mac) or dead keys (Linux), as well as direct Unicode codes for most any Win/Mac/*Nix platform, you should be golden.
Unless the developer of that input form was a complete moron and made extra-tight validation.
Plus, knowing the inputs for a lot of extended UTF-8 characters not found on a normal keyboard is also a wee bit of a typing superpower.
A line break is a non-printable character. So it would only work in the scope of electronic storage. The minute it hits other media, the line break character is subject to how that media handles it’s presence, and then it is lost permanently from that step forward.
Plus, many input forms make use of validation that will just trim anything that isn’t a character or number, removing the line break character.
Can certain remote connections be whitelisted?
I have a number of non-tech family members that I remote assist and remote administer. Clearly, I need to be able to log in remotely via RustDesk whenever needed, and since RustDesk has no auto-updater, I would need to whitelist the website (and their GitHub page) as well.
Because of capitalism. Because all content must drive quarterly profit ever-higher.
Meanwhile, public broadcasting (PBS) is still putting out great content for families regardless of profitability.
His router is tri-band though meaning it has 2 5ghz transceivers.
Unfortunately, for many models - like the Linksys WRT 3200ACM - that second antenna (technically the third one if you include the 2.4Ghz one) doesn’t function at all without the manufacturer’s firmware. It’s a dead stick with any third-party firmware, and is 100% software-enabled.
I have found this fact to be reliable whether it is DD-WRT or OpenWRT, and across several different manufacturers including Asus and D-Link.
Not the person you replied to, but…
What would it take Mozilla to do, to break your trust?
To move out of the least-worst option position.
Right now it’s in that position. It’s always been in that position, and IMO it has never not been in that position.
And for the record, I am not talking about Mozilla specifically, but the browser ecosystem for that rendering engine that includes any forks and derivatives… because things like Chrome’s maliciously flawed and user-hostile Manifest v3 also cascade down into forks and alternatives that are based off of it, and so contaminate many other normally-good alternatives.
I was there, during the first advertising push of the mid/late 90s, where visiting the wrong website - or even the right one on the wrong day - spawned “uncloseable” pop-ups and pop-unders… uncloseable because as soon as you tried to dismiss the window, that action triggered a half-dozen more to spawn.
Eventually, the weight of all the browser windows would cause not only the browser to grind to a halt, but even the computer as a whole (single-thread CPUs & minimal RAM, nat), such that your only possible recovery path was to conduct a hard restart of the entire system, your unsaved work be damned.
I feel for those businesses whose only possible funding strategy is via ads, but that well was lethally poisoned for me decades ago. I jumped onto the world’s first adblocker the moment it became available for Phoenix (now Firefox), and I have never looked back. The only way I will ever stop using adblocking is to stop using the Internet entirely.
8Tb optical disks don’t exist. Much cheaper to just do spinning-rust or cloud.
Didn’t Red Dwarf have an episode that touched directly on this? I recall Lister having some very uncomfortable experiences
If you are looking for Bar
, it is highly likely that you are already looking specifically for a particular functionality - say, the action
- for Bar
. As such, it is irrelevant which method you use, both will get you to the function you need.
Conversely, while it is likely you will want to look up all items that implement a particular functionality, it is much less likely you are going to ever need a complete listing of all functionality that an item employs; you will be targeting only one functionality for that item and will have that one functionality as the primary and concrete focus. Ergo, functionality comes first, followed by what item has that functionality.
There is a reason why little endian is preferred in virtually 100% of cases: sorting. Mentally or lexicographically, having the most important piece of information first will allow the correct item be found the fastest, or allow it to be discounted/ignored the quickest.
Canada doesn’t exactly have a peeps culture. I didn’t even know about them until I was in my late 30s, and encountered them in some HP fan humour sketch. Had absolutely no context, and no idea what TF they were.
You cannot print nearly-invisible yellow dots with only black toner, no matter how much you want to.
This is part of the reason I still have an HP 4050DTN and an HP 5000DTN. Plain B&W, but absolutely bulletproof and lacking all tracking, subscription, or DRM bullshit.
Hell, I can still get overstuffed cartridges that can do 20,000 prints at 5% coverage. I’m on my third one in two decades and two degrees with my 4050.
Temperate-zone seed fruit like apples and pears rarely look, taste, and feel like their genetic parents.
Temperate-zone stone fruit, on the other hand - think peaches, apricots, cherries, etc. - are quite different. You plant one of those seeds, and it will bear fruit that is (usually) indistinguishable from the parent tree that the seed came from.
Now, Apple and pear trees are grafted for both cloning of the fruiting section as well as good rootstock. But most stone fruit grafting has cloning only as a secondary consideration - they are grafted mostly to be joined onto well-proven, high-quality rootstock that can produce lots of sap and confer resistance to certain diseases.
Source: am orchardist.