Re: Which is why I always turn off email sigs...
Since mails with images are generally HTML-formatted they alreade were a PITA before they were even sent. No further arguments needed.
50 posts • joined 19 Jun 2017
As an owner of a proper computer during the very same era I never fell for such foolishness. There was a big picture of a (happily smiling) guy with a correctly connected mouse on the box of the AMIGA 500. AFAIK the user's manual was also quite clear about that.
Thanks for not mentioning ways to screw around with these brand new 3.5" drives and the corresponding media, by the way...
Venom's sound originally was called "Black Metal", "Thrash Metal" came up with Slayer and a number of similar bands (I would not claim to rembember or have ever known in which order). The term "Black Metal" soon vanished as the whole genre was summarized as Trash Metal and only reappeared with an isolated scene of extremely nasty scandinavian weirdos.
Hellhammer, however, were a quite story of their own...
"you have the easiest job in the world with guaranteed legal protections on your work. "
I'm sure he has. And I'm quite sure he's not an author. It usually is publishers and their shills who do the crying, because it's their profits that are affected, not the creators. Have you ever heard an actual author complain about public libraries having their books?
Sounds a bit like an outdated version of MPAC -or whatever else there is installed for .h264/5. The probably most hassle and GUI-free way to watch HVEC/AVC anyway is to install mplayer and just select "open with mplayer" (or doubleclick the video after setting the right default action). Used to work even with Windows and has the advantage of getting told explicitely what there is that exactly causes potential trouble when run from the command line.
They set up VPN do avoid the lag caused by hacked boxes? AFAIK a VPN needs two endpoints. One of them would obviously be located inside the target's network. But where if not on a hacked machine? You need to hack it to create the endpoint since you can't just leave it bumbling in the ear. So where's the difference betweed a rogue VPN machine and a hacked one?
I've seen three..., no four backup solutions in my life which did not fuck up terribly sooner or later. Tar and dump being reliable but useless nowadays (unless you've got lots of cash for a serious tape library), backup2l and Cobian backup which have never ever let me down in ten years. The latter of course has lost a lot of useability since Windows stinking 10 has pretty much ruined incremental backups since your base partitions content will change unpredictabily and Windows still has no useful concept of separating content and executables.
There's one thing you have mentioned but which can not be stressed out often enough: If you log into your account anywhere, no matter if using VPN, Tor or whatever magic, *you have identified yourself* to the site. Therefore you are *not* anonymous and not protected from tracking. Just the opposite: you have explicitely told them who you are and they'll know what you are doing there. That's the whole purpose of logging in.
Just when I considered giving the MS mail app a try on my (only) Windows machine...
Actually everything here is strictly Linux except one machine: That Lenovo X1 Carbon I use for music production and performance. I jused to read mail on my mobile when I'm out of house with my Windows laptop, because I have never seen anything communications related that Microsoft would not completely fuck up. Having heard nothing specifically awful about W10s mail app, I almost thought I might give it a shot. I guess I'll give Apple a one, next time. I absolutely hate them, but they can't be even worse than Windows 10. Nothing could.
Unfortunately, "unsubscribe" and the referring "x-unsubscribe-address" header are not only easy to forge but even easier to misuse as address verificators. So you can bet on them showing up in anything you've never subscribed to. (You probably have after trying to unscrubscribe, of course... :( )
Exactly my experience. Mailchimp, mcsv and their countless aliases seem to have been sending out their customers' (unsolicitated) "newsletters" without any checks on legitimation for years. Honestly, I've hardly ever seen any legit mail from them going through or MXs - but tons of spam and a significant number of scamming attempts.
What someone higher up the thread mentioned about battery-backed RTC chips lets me assume that these machines were not exactly running Windows. Usually you would find that sort of hardware in ancient Unix machines. Makes sense, as SUNs, SGIs and the like were running 64bit OS long before you could find x64 systems.
Reinforced concrete in single housing? Where in Europe might that be - North Betonia? Slabs and cellar walls granted, but certainly not walls. Even in reinforced concrete skeleton buildings the interior walls would be made from practically anything but concrete. Same goes for bearing walls in single or multiple residential, as concrete would never meet low-energy standards, leave alone provide reasonable room climate.
The one important thing about humans is that we always want to be what we are not. We also want to do exactly the things we can't do. Like fly, go to other planets, create self-conscious minds. That's totally fine, it's called "progress" or "pursuit of happyness".
Facts about corporations are that they consist of humans and their mottos always reflect the way they wish they were instead of the way they actually are. Which might lead us to the assumption that a company usually is just the opposite of what they claim (or whish) to be. But who wanted to work for someone with a motto like "We're a bunch of backstabbing, broke dilletants but we honestly hope to get better"?
LILO won't be of much use with UEFI. EFIboot supports loading an actual file (by its filename) as a first boot stage - which is basically a good thing, just not supported by LILO which is limited to loading a linear sequence of bytes directly from the HDD (MBR, usually) to RAM and execute it. The right version(!) ofGRUB however will handle EFI boot quite nicely if the system was booted with active UEFI which should be no problem when booting from an install image.
If you don't need secure boot, just disable it. The "secure" part of it was broken immediately but the annoying part persists.
If you have to use it use the actual Debian installer (netinstall or full) keep secure boot active, create an EFI partition (VFAT, ~10MB) during the "partitioning" part of the install (where you might have to resize the existing system partitions or wipe the "recovery" partion) and let the installer do the rest of the job. In the best case everything will run just fine. Otherwise you might have to jump into "boot options" from the BIOS' startup and try which partition to boot. There are some quite detailled HOWTOs on the net, BTW.
Biting the hand that feeds IT © 1998–2020