Did you umount the file system before unplugging the drive?
Did you umount the file system before unplugging the drive?
newpipe can play offline files I’m pretty sure
there is an ffmpeg flag to skip silences though it hasn’t worked all that well for me. I don’t know whether any audio player apps try to use it. In the worst case you could do something awful like run ffmpeg on a PC or under termux to make a new audio file with the silences removed, and then play that under some other app.
I don’t remember whether rockbox had that feature but I think efforts to port rockbox to Android eventually stalled due to technical obstacles. No idea whether newer Android versions could help with that.
Lots of texting in the presence of such doubts is destructive IMHO. Have a voice phone call instead. If you have to text I’d say “I have to go offline pretty soon, I’ll be free tomorrow after about 6pm” or whatever. I just hate long text conversations though.
Pick a distro you like and single boot it. If you want to mess with alternate ones, run them in VMs.
It can be fine, I’m using a comparable machine, you have to do the math for whether the power bills are worth it. What cpu does it have and how hard do you plan to run it?
Black holes. Predicted in the 1700s using Newtonian gravity. The event horizon diameter even turned it to be right (ie. matches the one predicted by general relativity).
I won’t say “better” but Perl 6 is … interesting. It’s not clear what version you’re using.
I suggest Haskell as your next language instead of Perl, since it will change how you think. https://learnyouahaskell.com is a good place to start.
A physical token only authenticates itself as “something you have” if there’s no way to extract the key from it. In practice non-hardcore deployments usually have a backup procedure but in principle, if you want multiple tokens, they should have separate keys. What you’re asking in simplest form involves storing the key on a server where it can potentially spill in a server breach or the like. If the key protects something very valuable, that can be dangerous. If it’s for your old Reddit account, you might decide to do it anyway.
It’s considered bad form to do what you’re asking but most 2fa apps have a backup restore scheme now. Is that enough?
I know someone who did that who is a REALLY GOOD, like pro level singer. Crowd was delighted when she started singing and they heard how great her voice was. Then they were slightly puzzled when some of the words were different. Then they realized she was singing a parody and they were like WTF. I suppose I’ll try it anyway if the occasion comes up .
Here she is singing a Queen–Bohemian Rhapsody / Star Wars crossover parody:
I mostly only know parody lyrics, so it will go badly no matter what.
Earl Grey, hot, straight from the replicator.
911 attack. I was sleeping on the couch at a friend’s place and he was apparently awake gaming online (yes that was already a thing in 2001). He came into the living room and apologized for waking me up but he wanted to turn on the TV because someone on the game server had said the had been an “incident”. This was a few minutes before the 2nd place hit. So it wasn’t yet clearly a terrorist attack. Ended up watching the coverage all day.
It’s a trade off between video quality and bandwidth but you can set the ffmpeg parameters to the bandwidth you want, more or less. If you have 2mbits up you can do ok. Motion detection can help if it’s for security and not much is happening most of the time.
We had something like e-readers and they didn’t need recharging as they were made out of dead trees. But each one held just one book, so you had to take a bunch of them to the bathroom with you.
It depends. What kind of beer?
If you have enough upload bandwidth I guess you don’t need the vps.
It always seems simplest to do this stuff with raspberry pi cameras or cheap webcams, and wired networks if feasible. Then use ffmpeg and icecast to stream through a VPS. Anything made as a consumer product is likely a shambles of crap software and security holes.
Interesting, I tend to worry less about the password store than external password managers. Maybe you are onto something and I should research it further. But the breaches I hear about have all been with external managers. I particularly don’t want anything uploading passwords to remote storage. If I have to share a password between two machines (laptop and phone), I just transfer it manually. Another minor nuisance.
I don’t think so. I guess it’s sort of possible that it automagically does that but I haven’t kept track. I just use umount(8).