How is Donald Trump ‘literal reincarnated Adolf Hitler’?
How would you even crack an encrypted database? I guess the hacker somehow stole it from the server and has it in their dump of other databases they’re trying to crack? I don’t do hacking, I’m just curious with how it works.
Not only that, a cop will probably pull you over for driving too normal.
The constant victim mentality there is unreal.
Merica’ fuck yeah!
Genuine question, what is fascism?
I agree, haven’t watched the debate yet, but I myself have mixed views on current America, mostly on mass surviellence (but we can always change that if we all tried hard enough!)
I like Chase Oliver views and I could see him being a better choice than RFK in my opinion. I feel like I could vote for him, even as a right-leaning straight white male! I really don’t like Trump or Biden, and I refuse to give them my vote.
I’m just looking to have my users not use JS to shop at my store. I’m not too familiar with web dev terminology.
It’s sad. What’s the solution?
Oh shoot, yeah I don’t have the money for that lol I’m just a small computer store. Is it okay just to use it for my blog then? Thank you and everyone else for the advice!
Does that mean I can register the name for my business name?
It is, this is my first website so I dont really know about trademark infringement too much.
I actually just tried installing it yesterday on Debian, I was able to build everything successfully, but I couldn’t figure out how to actually apply the theme. Unfortunately, the developer hasn’t written a guide for it yet. Would you be able to help me? Looking forward to your reply!
I will definitely come back with photos, I’m getting the Thinkpad on Friday or Saturday :-)
I’m also looking into customizing GRUB to look like this:
Edit: also planning on using this for my DE:
Well, theoretically they can, and it’s already been proven that they can tap into anyone’s phone, so what’s stopping the NSA from spying this much? The use of proprietary software in literally everything, and companies such as Google, Microsoft, Apple, etc. secretly working with them, not only that, but the amount of exploits the NSA has on hand is insane.
The whole point of this post was to get advice, not to be insulted. I’m new to the field, and documenting everything is a valuable lesson I’ve learned. My boss can be unpredictable, and there’s no good reason for not upgrading a system that only runs a single program and has significant security risks. I already plan to send the CYA email tomorrow and then drop it.
I’m not going over anyone’s head. The employee who needs the machine is the one asking for the upgrade because it’s impacting his work. He’s been requesting it for 8 months. Your attitude is unhelpful, and you’re making faulty conclusions. Just because I’m new doesn’t mean I don’t have valid concerns.
I’m looking for advice to handle this professionally, not to be made to feel bad for asking for help. Maybe next time, try offering constructive advice instead of acting superior.
Raped by a demon for about 20-30 seconds until I woke up. Pretty scary.
I don’t want to have anything proprietary on my network. I thought about putting the computer on a separate VLAN and all, but the NSA can probably still infiltrate any defense I have on my network. Regardless, there are devices on my main network my family uses that are proprietary. So, maybe I should keep the Z790-P for dedicated tasks like LLMs? I would have 3 computers running, my server, LLM machine, and my main desktop.