

The correct way for Finnish is: Osta eurooppalaista. Though if you want to say “you should buy European” (that’s how I’d interpret the original intent) then you’d say: Ostathan eurooppalaista. The first one is more of a demand then a recommendation.
The correct way for Finnish is: Osta eurooppalaista. Though if you want to say “you should buy European” (that’s how I’d interpret the original intent) then you’d say: Ostathan eurooppalaista. The first one is more of a demand then a recommendation.
at least existing features and data remain free.
For now.
Quite true. Linux and all modules loaded into it are GPL licensed. The userland and tooling on the other hand can be licensed however. They are free to close source on anything except kernel code.
This is the first step in moving to fully closed source. I guess degooled versions are getting too popular thus a threat to google’s business.
The file system was not unmounted cleanly so the dirty bit is 1 -> windows tells you to check the drive. This clears the dirty bit even if nothing was wrong.
laughs in btrfs and xfs
You can set the webpage to self refresh on interval by itself no extensions needed.
“Page refresh”. You mean F5 (or ctrl + r) right?
All of these already sound shady.
It depends on your threat model. Using tor via a know vpn endpoint does make you stand out and can be used to profile your traffic. One of the main points of tor is that all users look exactly the same.
If you have e.g. one user out of a 100 using a vpn endpoint instead of some residential ip address that user immediately becomes a much more interesting target. There is information floating around in the web that state actors have control over several entry and exit nodes.
You got most things right about UDP and TCP. They both work in the transport layer of the OSI model. They are also completely different protocols, related yes but independent.
UDP is “simpler” as it basically throws data packages in to the network and hope they reach their destination. TCP on the other hand has checks in place that verifies that a data package has actually reached its destination.
This is or was part of their anti-spam/flooding protection.
That’s the official explanation. A phone number is a nice way to attach a real world identity to the data (which of course is sold to advertisers/data brokers etc).
It’s all Fediverse. You can follow things on lemmy on mastodon and vice versa and so on.
Not the same thing. With session saving I don’t have configure anything.
KDE + wayland on Tumbleweed gave me this experience.
Wayland has at least one deal breaker for me. It doesn’t remember where my windows were at logout when saving the session. I have six virtual desktops and have specific windows in certain desktops. Putting everything back where they belong after each login, no thank you. Until they add that I’ll stick to X11.
I’ll add shift + f6 for refactor rename and ctrl + 6 for redefining your function i.e. add/remove parameters and/or return value.
Curious choice to write a c++ program for this instead of doing the same thing in a powershell script.
One feature it should have: delete itself after running to leave no traces of such a tool.