Just make it a Nintendo DS style: two separate screens with a hinge in between. They can make the gap caused by the hinge fairly small.
Just make it a Nintendo DS style: two separate screens with a hinge in between. They can make the gap caused by the hinge fairly small.
/home is for every program to store its personal junk in hidden files apaprently
Xubuntu is more than fine. Tbh it doesn’t hugely matter which distro you use for this type of thing
Honestly if you buy a Mac give macOS a try. It’s Unix based so you’ll feel at home in the command line. It doesn’t come with a command line package manager but there are two popular ones you can install (homebrew and macports).
Unfortunately it really doesn’t. And it’s actually Linux that’s the bigger problem: whenever it decides to updates GRUB it looks for OSes on all of your drives to make grub entries for them. It also doesn’t necessarily modify the version of grub on the booted drive.
Yes I’m sure there’s a way to manually configure everything perfectly but my goal is a setup where I don’t have to constantly manually fix things.
This is pretty close to how the US government is organized.
What about the test case where I’m using the browser’s dev tools to re-send http requests in random orders?
My experience was that the school provided free Windows keys for a personal computer if you needed one (they didn’t provide the computer itself) but the majority of computers I interacted with on campus (mostly in the computer lab) were Linux (some Debian variant iirc). I think the printing computers in the library were windows. I took an art class at one point and they had Macs (it was for using the Apple’s Final Cut Pro).
We never used LibreOffice though. Everyone just uses Google Drive.
You can also just make bare got repositories on any server you can ssh into.
One Minecraft server I played on installed a program for blocking x-ray hackers (a type of hack that lets you see valuable ores through walls so you know exactly where to mine).
The anti-xray mod worked by reporting to the user that the blocks behind a wall are a jumble of completely random blocks, preventing X-ray from revealing anything meaningful.
This mod resulted in massive lag, because when you are mining, every time you break a block, the server now needs to report that the blocks behind it are now something different. It basically made the game unplayable.
The server removed the mod and switched to having moderators use a different type of x-ray mod to look at the paths people mine in the ground. Those using x-ray hacks would have very suspicious looking mines, digging directly from one vein to another, resulting in erratic caves. Normal mining results in more regular patterns, like long straight lines or grids, where the strat is to reveal all blocks in an area while breaking as few as possible.
Once moderators started banning people with suspicious mining patterns, hacking basically stopped.
It’s possible to still hack and avoid the mods in this kind of system by making your mines deliberately look like legitimate patterns, but then the hacker is at best only slightly more efficient than a non-hacker would be.
Conceptually this is basically just standard encryption: some math that spits out gibberish unless you have the info to make that gibberish become something useful.
It’s just marketing.
It’s like how a 7 or 8 out of 10 movie should mean it’s really great, but actually means it was just “ok”.
We like the idea that we are getting something above average, which ends up with a skewed idea of what average is.
Honestly, if it’s just a small, personal project, just use common sense and take some basic precautions (e.g. use a firewall, use NGINX instead of serving Wordpress directly, etc.).
Note that CloudFlare doesn’t protect you from everything either - it only provides some very specific services. A rudimentary level of caching images being the most common one a free account level would be able to use.
input
prints the text based as an argument to the command line, waits for the user to type text followed by a new line to the command line, and returns the text as a string as its return value.
TLDR input
asks the user for text via the command line.
lol your VPN company is going to kick you the instant you turn on LOIC through them. Your packets wont even get to the target site because you are basically attacking your own VPN.