Yeah, he reimplemented it in Java to get garbage collection. The Alzheimer’s is cured but he takes ten minutes to pour a glass of water.
Yeah, he reimplemented it in Java to get garbage collection. The Alzheimer’s is cured but he takes ten minutes to pour a glass of water.
Whoops, stopped the lungs process instead of the cardiac arrest process.
Actually you really want to restart the heart service, right? sudo systemd restart heart
Subcom: noum (informal) a submissive comedy
This is partly why I prefer Firefox’s implementation of the find feature - it allows case-sensitive search while Chrome does not support it.
Surely the word ‘in’ would appear countless times out of context on the table of contents.
At work they just call me: “Put those pens back and get outta here; you were fired weeks ago!”
Great song and free as in freedom.
I prefer “super-availability”.
commenting out the whole block
var foo is declared but not used
is such a pain in my asshole when doing this.
I’m a developer and I hardly ever compile shit for my personal computer from source. I’d rather use a package manager, sure, but on Windows that’s by far the exception to the rule and if you want regular users to use your app, it needs to be a downloadable EXE.
Good to know! What’s the practical use for a L2 VPN?
Nowadays Wireguard is a more performant protocol, but it does the same thing.
They seem kind of slow, but you can be assured that they will always make time for taking the garbage out.
Whoops, I accidentally deleted my comment. Here’s the link again for posterity: https://www.usenix.org/system/files/1311_05-08_mickens.pdf
This sounds like something James Mickens would write.
My favourite by him: The Night Watch (PDF)
Metasploit becomes your “decompiler”.
Changing your MAC will make older messages undeliverable, but that just means the connection will be momentarily interrupted until you establish new connections after re-connecting to the WiFi.
Why not just assign yourself a different internal IP? Because a. the router probably wants to assign you one itself via DHCP; and b. the router isn’t looking at your IP address to lock you out; it’s looking at your MAC address.
If your IP address is where in cyberspace you are, a MAC address is who you are. If you want to fool the bouncer, change your name, not your address.
I’ll have what he’s having.