There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

Active

This community's stance on physical media ownership?

I might be asking a rhetorical question here but I was curious as to the overall consensus on physical media. Do support it because, unlike streaming, media can’t take away what you’ve payed for? or are you against because it’s a waste of money when you can “acquire” it through “alternative means?” I’m also...

Passing on the right on a highway

Why is it illegal to pass someone on the right on the highway in the US? In Canada if there’s a three lane highway which, in my case, isn’t very prominent, there’s really no law that enforces it, it’s more of a respect thing here on two lane highways both ways if someone is going slow in the left lane to go into the...

How do people find good information on the internet these days?

It used to be that you would do a search on a relevant subject and get blog posts, forums posts, and maybe a couple of relevant companies offering the product or service. (And if you wanted more information on said company you could give them a call and actually talk to a real person about said service) You could even trust...

How can I launch a program from a bash XTerm and run a while loop at the same time?

I want to launch Oobabooga Textgen WebUI from the command line with its serial output. I also want to run a while loop that retrieves the Nvidia GPU memory available and temperature for display on the header bar with a 5 second sleep delay. How do I run both of those at the same time?

How does ransomware get into major networks, such as schools or other large public agencies?

I read an article about ransomware affecting the public transportation service in Kansas, and I wanted to ask how this can happen. Wikipedia says these are “are typically carried out using a Trojan, entering a system through, for example, a malicious attachment, embedded link in a phishing email, or a vulnerability in a...

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines