Ist das eine Bild zusammenführung mit nem anderen Menschen oder nur eine vermännlichung?
Ist das eine Bild zusammenführung mit nem anderen Menschen oder nur eine vermännlichung?
Whats up with you guys? I’d rather have a fresh out of the gym teenager next to me in the bus then an Justus who smells like an axe factory.
How normal body odor is a tabu in some cultures and where deo ads which tell you its bothersome if you smell normal is still a thing in 2025 really grinds my gears
Danke für den Hinweis “^^”
Außerdem: sprich deutsch du h*so /s
Lange keinen so bescheuerten aber so guten shitcut gesehen
I like the word swaticar, quite fitting. But I would never use the word swatiscar Its mean
Who TF is this dude who seems to be the New meme
So what Kind of sleeves do you have down there?
Sadly the sporty looking biker glasses that make you look like you are a 45 year old man in your midlife crises work best in my experience. I have a pair with only a very slight shading so I can wear them on cloudy days. Mine are also made out of plastic, which makes them not get so blurry from condensation
The fact i was considering this to be real for a Moment tells a lot about americans
I kinda do, that’s why I wrote, but no hard feelings :)
Most communists/socialists arent tankies (even if .ml tries really hard to convince everyone otherwise) but identify with hammer and sickle too :(
But fk tankies, I’m with you on that
Thanks for the breakdown. I ofc use a root pwd different from my user PW (with sudo privileges) and often use appimages, as they don’t require privileges at all to my understanding. I do run a few binaries though, as for example for team speak or corectl they are the only ones that work for me.
How would I go about restricting the files a program can access? Make a whole new user just for that program, put “run as this user” in the .desktop file an manually set read/write permissions for every single file on the system?
This seems unpractical. Is there a best practise guide? Do I need to get into apparmor and stuff?
If im to noob to unterstand how to actually
“employ robust application control to block malicious libraries and payloads used in Dynamic Linker. Implement behavior-based endpoint detection to identify and prevent process injection activities.” And “also implement strict access controls, limiting administrative access,”
Because I don’t really know what this means, what should I do?
Is there a step by step guide somewhere?
Was sending it before I saw the comment is expandable, read the second paragraph, deleted 30sec after posting. How did you all read it and replied?
You guys must be fucking fast xD
this looks like esoteric hippie shit with no evidencial basis which will help me with my clinival anxiety as much as someone saying “just open up”