![](https://lemmy.world/pictrs/image/84b25fb7-44d7-4c99-9e1b-dc9f2801e33f.jpeg)
![](https://lemmy.world/pictrs/image/d82718c7-5579-4676-8e2e-97b4188f10d3.png)
Could have little tiny proto shrew cheese curds.
Could have little tiny proto shrew cheese curds.
Part of it, too, is selective breeding (aka genetic modification, but that’s a dirty word).
https://www.bhg.com/news/brussels-sprouts-less-bitter/
Edit: I may be misinformed. I thought selective breeding was technically considered GM, but it sounds like only editing outside of breeding might be what qualifies. Didn’t mean to make this post about technicalities, just meant to point out that genetics has also played a part in arguably more palatable plants.
Combine that with the stupid piped-in engine noise (through the sound system) and you can make anyone feel right at home in last century’s technology.
I think everywhere you’ve posted this has been relevant to those particular threads. I appreciate you carrying that torch.
deleted by creator
If they control the domain, they can see all incoming mail delivery attempts to sniff for addresses that were used. They’d still have to know the domain of the email address for the login they were attacking, which might not be super useful if they’re going after a certain login. But, going the other direction would be more fruitful: buy a domain, dump all incoming mail into a catch-all box, and start looking for bank alert emails or other periodic/promo emails. You might find services that just use email addresses for a login name, or ones that have a “forgot username” feature that only uses email for recovery. Multi-factor auth spread across multiple services (email, SMS, authenticator codes…) would help mitigate significantly by making them also have to take over a phone number or get an old device. Not impossible, but then you’re making them work harder for it, and when good account recovery services heavily mask the available targets, it makes it harder to know what else to acquire (e.g., a specific phone number) even if they get as far as full email domain control.
I hitched my horse to just what I consider the basics–zip and unzip–and that has made it easy for me. But I’ve been stuck on those.
Extract anything:
tar xf <archive_file>
Create a tbz2 archive:
tar cjf <archive_file.tbz2> <stuff to put in it>
(And tossing in a -v
is pretty universal, if that’s your thing.)
Some day, instead of commenting on a reddit Lemmy post, I think I’ll Google how to tell it to use .xz
.
Ok, you know what? Today is finally that day. It’s just capital -J
instead of lower-case -j
! That’s easy enough to remember, I guess.
I feel so lucky to have been here for this discussion today.
haaaands
This referred to CUNY a few times. I thought that, City University of New York, was a different institution, and I got the impression the article was referring to Columbia University as CUNY. Maybe I missed something?
“it’s a car, not a church.”
I remember seeing a documentary or news piece or something about a woman who pivoted hers to “BISCUIT!” I really hope that was real. But I don’t remember how she got there, like if she had to trick herself that “biscuit” was offensive.
But is it a dead name? Last I looked, the URL was still “twitter.com”.
Cookie Monster in a toilet.
Always has been.
Many people dislike their own names, but I think SomeGuy69 is an awesome name, too. Cheer up!
Well, careful there, ZZ
is like :wq
; ZQ
is like :q!
.
“Glorious leader” sure sounds like a pretty direct reference to the Kim dynasty.
I think you’re going to lose a few people with that first number being off by a decimal place, but the substance of what you said is still relevant and gives insight about the Lemmy experience right now.