Do you then read ‘dd’ as ‘disk destoyer’ to send chills down people’s spines?
Do you then read ‘dd’ as ‘disk destoyer’ to send chills down people’s spines?
Yeah. Then I think we are doing the same thing.
I pronounce it in swedish so that its just Satan without the -n.
So an /oun/ instead of an /ōn/? I hate it! :-D
Do y’all ponounce it as one word? Heard someone once say “c-h-own” and I was confused.
Radicale? https://radicale.org/v3.html I have not used it much myself yet. Its very minimal and focused on calendar stuff.
What can you do with thw WSL? Can you run a wm for example with it? And if so, can you use the super key as a modifier?
Is either a replacement for the other?
If the above decides to continue, the code appears to be parsing the symbol tables in memory. This is the quite slow step that made me look into the issue.
That is from the original find. Not sure the relevance of it and this being proof for it being “on purpose”. But that is the origin of the slowness.
Distros like gentoo reverted to 5.4.2 for that reason. If debian stable is on 5.4.1 that should be ok.
Having used gentoo for quite some time, there have been several occations where my network broke because the changing names and naming conventions of the network interfaces.
1999, peak civilization, just easy lives for everyone!
Switches to linux: “There seems to be something called X on here! You seeing this too?”
With both X and Wayland support!
Never encountered a bz2 tar? Then the flag is j
.
This. And, yt-dlp and/or youtube-dl used to have an issue where if the url started with the video ID instead of the playlist ID, it just downloaded the video not the whole playlist. Not sure if that is still around, then just be aware.
The key needs to be available to continue to be able to decrypt the data on the device. All encrypted data is not decrypted as you mount or unlock your encrypted device, that is done one the fly as you use it.
The attack you are thinking of should also not be relevant. What you worry about appears to imply that you are more concerned about the key being protected, rather than the data the key protects. You seem to wish to have your decrypted data available, but not the key.
Yay, more ways to (accidentally) destroy my data!
Ah, postfix looks like what I’m looking for, thanks. Have to see if I can figure out how to configure it.
well “saata” is closer to the pronounciation of satan in finnish, “saatana”. Was it Linus you’ve heard?