Beating good old amputation speedrun with 300% mortality?
Beating good old amputation speedrun with 300% mortality?
A so-called “meta distribution”, allows you to mix and match packages from some other distros. Kinda like distrobox, but older (AFAIK) and low level-er.
That said, I didn’t find it exactly useful a few years ago, since pretty much everything i needed was in the aur or the official repos (should be better if the base was smth like Ubuntu)
Other inits cut out udev and logind and run away giggling into the sunset, obviously
*ssd. HDDs are somewhat good for storing large amounts of data, and the os ain’t it (unless windows, probably)
How about Numbers 31:17-18 where Moses says:
Now therefore kill every male among the little ones, and kill every woman that hath known man by lying with him.
But all the women children, that have not known a man by lying with him, keep alive for yourselves.
As a Russian bot, I’m deeply offended
This one doesn’t, tho, unless you care how presentable the back of your pc is… And mine was for a few years just an array of parts and wires on the side of my desk, soooo…
All clothes are no-iron clothes if you DGAF enough :)
Well, duh. All governments are cancer
Sure, don’t mock. Just test in production
Just shove wondows in a VM or something
You’re probably looking for these 2
3.4 ounces of sulfuric acid, 3.4 ounces of nitric acid, 3.4 ounces of glycerine… Bam blyat!
They’re more secure (albeit in many wsys security through obscurity) than private, although the privacy aspect is probably among the best you can get by default as far as I can tell. On the other hand, if you’re willing to do some relatively simple steps and buy specific hardware, you can achieve better privacy and security on both mobile (graphene) and desktop (qubes) devices.
I personally dislike them for building unrepareable crap, tho.
I suspect those may depend on choosing a particular response to some of the previous questions
Crawling in my skin These wounds, they will not heal
Sure, because more java is all they ever needed, apparently 🤣
You mean this: https://www.bleepingcomputer.com/news/security/hackers-use-poc-exploits-in-attacks-22-minutes-after-release/ ?
Pretty regular stuff if you ask me