Yeah, that’s what I’m getting now, too. Hopefully they take the deadline into account for rate limiting… Still good to have warriors ready to retrieve, I guess.
Yeah, that’s what I’m getting now, too. Hopefully they take the deadline into account for rate limiting… Still good to have warriors ready to retrieve, I guess.
Not sure. They don’t mention 4 being in beta or anything. Though they don’t list much advantage of using it over 3 either.
Still just read-only!
I can only theorize, but I doubt this specifically was the will of the malicious actors :)
Something definitely went wrong on their part, maybe even because of a DOS attack. Javascript-infested sites are anything but trivial to preserve anymore, but mixing it up like this is very unusual.
vast majority
The handful of good ones aren’t why mobile gaming is worth more than PC gaming.
There is no IA community, so I thought you all might be interested.
The vast majority of mobile games are comprised of three mechanics:
and repeat.
I’m just here to lay some hate on the proprietary apps: they bad.
Can’t help with your question, sorry.
When that happens to me in firefox, changing to another tab and back usually fixes it.
You can turn off miui optimizations to stop it from immediately killing every app you leave in the background.
(and not to digress but you shouldn’t use a stock miui rom if you care about privacy)
Ah, nice! I tried to avoid powershell while on windows, so don’t know much about it.
You can get all the IDs using yt-dlp
yt-dlp --flat-playlist --print id <playlist>
Assuming you’re on linux, you can add at the end to save the list to a file. ids_all.txt
You can also add
--compat-options no-youtube-unavailable-videos
to get only the list of available videos instead and then, again assuming you’re on linux, do
diff ids_all.txt ids_available.txt
to get the odd ones out. That’s the simplest I could come up with. You’ll have to hope you can use the wayback machine, or a good old exact search to turn up what video that ID actually referred to
But will you be punished for not telling them that the key is under the mat? They will get in either way. They can get into your hard drive with brute force too, it’s just a wee bit more trouble for them.
This feels weird to me. If your password is “ILikePotato”, which is then used to decrypt a text file that contains “IStoleTheMonaLisaAndReplacedItWithAPhotocopy”, how is that any different in terms of “incriminating yourself” than if it was the other way around…?
And if you actually forgot your password, that’s 3 months jail for you, because they’ll hardly believe you? Better have just one so you’ll surely remember!
I wonder, if you use special markings to keep track of your illegal doings, and one of your notebooks is found during a search, are you required to assist in deciphering the contents of it? That’s basically the same thing as decrypting your hard drive.
There’s a million alternatives that do the exact same thing. Fastfetch is just better, since it’s still maintained, and not painfully slow. I used to think neofetch being slow was kind of cute. Then I switched to fastfetch, and now I can’t bear the years neofetch takes to run.
Mint handled my 1060 really well and it’s really good on arch too with the newer driver. Still just running Xorg with cinnamon, though. I guess mileage still varies with this stuff.
Is it HURD’n’ time?
My buddy was in a class doing a programming test. It was a couple minutes until turn in time, so he went to zip up the source files. He had already ran the appropriate zip command previously, so he pressed up three times and then enter. It appears he had miscalculated, because the command that ran was rm *.c
. There were no backups.
I am forever at war with spider mites and neem oil is my Mercy holding out her hand.
If you’re getting rid of a (rusty) drive and it leaves your hands with the cool magnets and shiny frisbees still inside, you’re doing something wrong.
They are about to double the rate lmit, so it should be a little better…