According to your table, it’s not as bad as that, just not a good idea. E: Wait, missread that as thorium.
According to your table, it’s not as bad as that, just not a good idea. E: Wait, missread that as thorium.
I’m more impressed that ms didn’t write this as a 150MB binary than anything else.
Needing to deactivate 2fa to link a new authenticator is one of my big complaints about so many systems. You should be able to pair a new one without removing the old one, or at least have it replace it.
That’s the thing, that background can also look like a harsh sunlight, which would typically give you a blue tint. Your brain has to guess which is right.
That sounds roughly related. I see ones like: excel file broken!!! Actual issue: it’s dark so the computer screen is too bright and when they put sunglasses on due to the brightness, they can’t read the numbers. Solution is to turn the lights on.
Probably “dead on arrival.” ie. useless.
The first half sounds so true to me. Like it was an intern that really wanted a replica set, but instead of using the same platform the company was using, hacked together something running on Linux. Ofc they didn’t tell anyone how it worked, and everyone else knew windows server so no one poked it.
It used to be running on a spare pentium 4, but was virtualized as no one knew why things stopped working when it was turned off
It’s less of a main, and more of a “don’t do this if being imported.” You can just throw code without that block and it will run.
Sounds like it’s perfectly replicated the help forums it was trained on.
Yea, it’s animated for me on a web client. Looks quite good tbh.
Thanks, and added.
Although it would have been nice if I could “upgrade” from email based 2step instead of having to disable it.
Probably using the same password.
Yea I would think anyone who has a workaround is keeping it quiet, otherwise it’ll get fixed before then. Then it would be harder to break it for gta.
So far it either sounds like they are replaying the message, or it’s just a (partial) list of numbers that used steam. Might be good for targeting, but that is about it. They would have to know the associated account to do any intercept attacks.
Iirc, if you use a non-linear scale, it comes out properly as his face.
Perhaps she only used an extra core, GB or so on her friends’ servers?
The invention of ssds was not to speed up computers, but to allow us to have more unwanted stuff autostart.
I’m sure the dog was having the time of her life! I do wander if part of the reason for the effort might have been worry about the ecological effects of the dog.
I think that depends on common shoe sizes. With the biggest feet there is no way I could put on anyone else’s socks.
I did this once by accident (bad scripting, managed to abort it,) it wasn’t too bad until sudo told me that the sudoers file had the wrong owner. I then learnt that there are other ways to become root.
OS ran for another ~6months after I re chowned etc to root.