At what point does a soup become a stew?
At what point does a soup become a stew?
“Trusted officials”… Um… yeah, but no.
What I would like to know, where did these people get the phone numbers and names of the people they sent the texts to.
From what I’ve read, these texts included the recipients names.
I guess personal data in the U.S. is just a big all you can eat buffet?
I’m curious if anyone has ever done a longevity test. Rather than Io performance, I’m more interested in how quickly they wear out.
Frankfurt area code?
ASM… Stimmt. ASM und Power Play. Mein Gott wie oft ich da ein einzelnes Heft gelesen hab, bis die nächste Ausgabe raus kam. Aber ich kann mich tatsächlich nicht mehr erinnern wofür ASM stand.
Power Play… Da werden Erinnerungen wach… Scheisse bin ich alt.
You can either describe what you want, or show a picture of a haircut that you like.
How about no, and not generate any views and possible revenue for that garbage?
Who are they?
You could setup imapsync and sync your Gmail to a self hosted IMAP server and just never delete your mails.
Dude, this is the kind of red flag, where you really should get the police involved, or at least consult with them.
Wouldn’t expect anything else from Qatar.
But seriously, who in their right mind would use Grindr in Qatar? If I was gay, I would be veeery apprehensive about being in Qatar or even just working for their airline.
“It’s once pedophiles have kids, that they really come into their own.” - Gary Delaney.
You can also self host it via docker.
If you want to learn more about computers by using Linux, I suggest something like Gentoo. Don’t know if it’s still the case, but I started with Gentoo back in 2003 and it took me 3 days until I even had a GUI. Learned a ton in the process about Linux under the hood and how it all works together. Thanks to Gentoo I have a well paid career as a Senior Linux System Administrator.
That being said, i should mention that I grew up with DOS, so I didn’t have the same apprehension as some people, when it comes to the command line and editing config files.
This is probably true of most distros.
Did you encrypt your swap as well? I used to use hibernation back in the day but without LUKS encryption. Ever since I’ve started using LUKS encryption, I never bothered with hibernation again, allthough I would like to.
Incidentally, would a bowl of cereal be considered soup?