The funny thing is, it’s not actually hidden if you know how to see them. Just throw “/likes” after a profile. They only hid the fucking button.
The funny thing is, it’s not actually hidden if you know how to see them. Just throw “/likes” after a profile. They only hid the fucking button.
*Babbages’s’
When the only choices are parkour or menus? Yes.
800-53 Rev 5 is such a pain in the ass to implement fully but holy shit is it much needed. Bad actors out there everywhere and if followed to the letter, those controls will save you almost every step of the way. “Almost” because there will always be a new method to infiltrate an organization or agency, but the damage control built into these controls should lessen the impact regardless.
Only thing surprising is that it took this long for it to happen. Everyone else knew that there would be immediate forks made but seems they took a month to catch up to speed with the internet.
+1 for Curly Girl method being mentioned.
It’s unfortunately named since this is good for anyone, not just women. Have been using various “free” products for about 6 or 7 years now and my hair always feels great and all the natural waviness of my hair came back.
Their marketing dept is probably concerned.
Uhhhhh yes? Correct?
Because no one addressed it yet, you won’t be able to use Game Pass at all on Linux (unless you’re using the streaming service). There’s no way of making that work currently, and may never be a way. But for most everyone else? Most things just work out of the gate with no tweaking. But for things that don’t, use https://protondb.com
Btw, I use Arf.
101F = 38.33333C101F = 38.33333C101F = 38.33333C101F = 38.33333C
I can from personal experience that there is a huge push to get much more secure in the local government space in the US, including adhering to NIST 800-53, and be audited on it. It’s not foolproof, but it’s a much needed step forward towards preventing big events becoming breaches. But if they are a breach they’ll be lower impact. It’s painful to get there, but I’ve been involved heavily in the conversion in policies and procedures to get there.
I wouldn’t say that Windows is malware itself, but rather it wasn’t created with a security-first stance, which we absolutely need for all OSes going forward. I say this as someone who ditched Windows as my DD (“I use Arch, btw”). I left Windows more for their policies and subscription models that are becoming increasingly anti-consumer.
With that said, let’s not pretend that Linux is immune as has been proven in the past week with xz and liblzma being compromised. Yes, it took 3 years to get to the point their long game paid off, but it still happened through a series of credibility social engineering steps by a single person. (Yes I know others were also trying to do exactly this, but only Jia Tan was successful)
I say we name it “Thatsno”
God dammit Moon Moon.
I have half a clue and also call it reseating.
My electric toothbrush kinda has a nipple shaped wireless charger.
I have to say, I like your hardware.
They may actually have fixed it now. Worked all day yesterday for me but it just redirects to the profile URL now for me too.