

I agree, but if my only choices are “copy-right law as it is” vs “abolish all forms of copyright law, including plagiarism”, I’d go with the later.
(I am only talking about “law” here. People and orgs should still boycott and denounce plagiarism.)


I agree, but if my only choices are “copy-right law as it is” vs “abolish all forms of copyright law, including plagiarism”, I’d go with the later.
(I am only talking about “law” here. People and orgs should still boycott and denounce plagiarism.)
if you underwear is not rated for 80°, then don’t cook it at 80°?
social media posts are no proof of having a life
you may be on to something here…
Yes, they did fire in all directions and some of there jokes did not age well. What is your point? Are you suggesting that they are evil because they were not 100% correct all the time?
(also iirc for that specific episode they did a correction 10 years later. )
iirc it’s tls secured between client and server and again between servers. So no e2ee, but if you trust your provider, everything should be good.
iirc law enforcment regularly forces providers to reveal content of client’s mailboxes.


the isnt even a correlation in that graph. e.g. if you look that crime peak in 2023, there is absolutely no correlating peak or drop in the twitter posts.
that comes with support
biggest point.
When you build your own linux pc, you will always have a big risk of some unexpected problems. Lowering the bar of technical expertise to run linux is the main selling point here IMO.


when people post cropped porn, they should also post which porn they cropped, so people know which porn to avoid.


Here are the steps:
- The attacker creates a standard Git repository.
- They commit a single symbolic link pointing to a sensitive target.
- Using the PutContents API, they write data to the symlink. The system follows the link and overwrites the target file outside the repository.
- By overwriting .git/config (specifically the sshCommand), the attacker can force the system to execute arbitrary commands–
amazing.


deleted by creator


but there’s no way to know for sure
draw something from memory on a piece of paper, and then draw the same thing again while looking on a photo. --> can you tell the difference between the two drawings?
self promo should be allowed if it’s marked as ad, and the account is older than 12 months, and keeps it down to 1 post/month. update this rule to ban all ads, when ads make up for more than 20% of all posts.
shirt concepts: dont make a new rule, just because you dont like a single post. whats wrong with you?
hats should be allowed, since they are basically small shirts for your hair.


i use nyarch btw
the linux-file-deletion is used as a example for good software design. It has a very simple interface with little room for error while doing exactly what the caller intended.
In John Ousterhout’s “software design philosophy” a chapter is called “define errors out of existence”. In windows “delete” is defined as “the file is gone from the HDD”. So it must wait for all processes to release that file. In Linux “unlink” is defined as “the file can’t be accessed anymore”. So the file is gone from the filesystem immediately and existing file-handles from other processes will life on.
The trade-off here is: “more errors for the caller of delete” vs “more errors due to filehandles to dead files”. And as it turns out, the former creates issues for both developers and for users, while the later creates virtually no errors in practice.
at least werner von braun was a high ranking nazi. I am not sure about the others
yes, you could argue, that slaves under werner von braun had better survival chances than else where. (I am not sure if that is true though)