![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://spgrn.com/api/v3/image_proxy?url=https%3A%2F%2Flemmy.world%2Fpictrs%2Fimage%2F668bf479-e446-46a8-bfa5-d28438837767.png)
Did anyone have to read this in high school?
Did anyone have to read this in high school?
It’s the same 2018 one - but it comes from insiders and there’s not a video
Trump rejected the idea of the visit because he feared his hair would become disheveled in the rain, and because he did not believe it important to honor American war dead, according to four people with firsthand knowledge of the discussion that day. In a conversation with senior staff members on the morning of the scheduled visit, Trump said, “Why should I go to that cemetery? It’s filled with losers.” In a separate conversation on the same trip, Trump referred to the more than 1,800 marines who lost their lives at Belleau Wood as “suckers” for getting killed.
I can’t believe they wouldn’t give you access to their genetic code… smh my head
There isn’t a way to check if you’re connected to a Bluetooth device through automations :/.
The best you can do is set an action after you connect/disconnect from a known Bluetooth device
Acrobat has a decent “auto create form fields” feature that I haven’t seen anywhere else and it saves me a lot of time
Does anyone know if there is a nottheonion community on lemmy?
Well it sure is a good thing they are making everything smart nowadays….
But seriously I can’t believe how fast the car industry locked previously free features behind a subscription
Something something Skyrim horse armor something something….
You should be able to assign that vlan to a port (ex. eth0, eth1)
Just wanted to add this link explaining how to use tunnels in a more privacy respecting way
https://help.nextcloud.com/t/is-cloudflare-tunnel-safe-privacy-focused/150268/2
Problems with TLS (free option of routing on cloudlfare tunnels)
interception (or HTTPS interception if applied particularly to that protocol) is the practice of intercepting an encrypted data stream in order to decrypt it, read and possibly manipulate it, and then re-encrypt it and send the data on its way again. This is done by way of a “transparent proxy”: the interception software terminates the incoming TLS connection, inspects the HTTP plaintext, and then creates a new TLS connection to the destination.
You can use the WebKit (Safari’s engine) wrappers made by Firefox and Chrome - but can’t use truly independent browsers
But how can it trust you’re a person when it just confirms that you’re running an in-modified site. It takes a hash of the site, then make sure your local view of the website matches that hash.
This disables add blockers, custom css, etc; but I don’t see how this standard would prevent bots…
Many CSAM detecting services already use image hashing to compare to a central database.
https://www.thorn.org/blog/hashing-detect-child-sex-abuse-imagery/
Is there a simple way to block individual scripts with uBlock? I’ve only found a simple way to block 3rd or 1st party scripts and frames altogether.
I’d just like to interject for a moment. What you’re referring to as Linux, is in fact, GNU/Linux, or as I’ve recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX. Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called “Linux”, and many of its users are not aware that it is basically the GNU system, developed by the GNU Project. There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine’s resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called “Linux” distributions are really distributions of GNU/Linux.
What about rogers center? Or even Roger’s place?
God there are so many of them