Comments

This profile is from a federated server and may be incomplete. Browse more on the original instance.

rockSlayer, to linuxmemes in I bet the rest of the world has better paper

Legacy dependancies

rockSlayer, to privacy in Signal leaked random contacts to me!

I don’t think it’s the same user, but here’s a report on GitHub with same repro

rockSlayer, to linux in would it be illegal to download Ubuntu on a Chromebook?

I’ve done this myself. It’s 100% legal to do. The only thing you need to be concerned about is if the distro you want to use is compatible with your Chromebook.

rockSlayer, to memes in This is an outrageous demand.

and it’s too many damn pages for any man to understand

I’ll see myself out

rockSlayer, to memes in Spread Kindness ❤️

Good thing indexes start at 0

rockSlayer, to linuxmemes in Need to switch to Hanna Montana Linux now

Different strokes and all that. I’m personally ok with the way this is done, but I can also see why people wouldn’t like it at all

rockSlayer, to linuxmemes in Need to switch to Hanna Montana Linux now

That’s pretty much how I feel about it. This specific method is alright by me, but it could very easily become something intrusive.

rockSlayer, (edited ) to linuxmemes in Need to switch to Hanna Montana Linux now

This is the “ad”. Personally, I don’t think a little plug like this is worth any kind of fuss. If it were a real ad or something, then yea I would get it.

https://lemmy.world/pictrs/image/d9532407-3580-4780-abe3-eaafe640c3c9.jpeg

rockSlayer, to memes in You can tell she's very impressed.

I see your Mongolian Empire and raise you the British Empire

rockSlayer, to memes in Is this what people think about Tor browser?

It’s a heavily modified firefox browser designed to work with something called “the onion network”. It’s called this because there are several nodes on the network designed to obfuscate your Internet traffic by wrapping a layer on your Internet traffic, creating an “onion”. All of these layers mean that each node only knows what the previous and next nodes are. The most vulnerable nodes are the starting and exit nodes, because they can identify you and potentially trace back your IP. You also can’t choose your starting or exit nodes. It’s well known that the US federal government controls some of these exit nodes.

rockSlayer, to memes in Doesn't help that I had bedbugs once years ago

Are they like fruit flies? This might sound strange, but wash the walls. Fly eggs will get laid on walls, so washing them off will make a decent impact. You’ll have to do it a couple times

rockSlayer, (edited ) to linuxmemes in Foolishness

I’m aware of how recursive force remove works. I’m just kidding around.

rockSlayer, to linuxmemes in Foolishness

I’m not brave enough to test it on my distro, so I’ll take your word on that lol

rockSlayer, to linuxmemes in Foolishness

Excuse me, but that type of foolishness requires – no-preserve-root nowadays

rockSlayer, to historyporn in Nazi shithead rally in Buenos Aires, Argentina, 1938

You might also be surprised at the attendance for the Madison Square Garden Nazi rally in 1939.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #