Comment Re:System Bug? (Score 1) 48
On the one hand I was confused how systemD was involved in the launch.
Then you haven't been paying attention - all the systemd supporters are adamant that it is descended from launchd!
On the one hand I was confused how systemD was involved in the launch.
Then you haven't been paying attention - all the systemd supporters are adamant that it is descended from launchd!
That's partly because T-Mobile is basically a European phone company - they're the international arm of Deutsche Telekom...
LEGO is contraception in its own right - just play with LEGO and you can guarantee that you're never having any kids.
I assume he means that his GPG key is used to sign packages which get loaded to the Debian repository, which you could potentially use to upload a package with a root-executed file in it...
In many PDF readers I have used, the space bar key works the way you've described - scrolling by one screenful.
I'm not on my usual PC, but I've just tested both Adobe Reader and the Firefox built-in PDF viewer, and both scroll by a screenful both for the space bar, as well as for the page-down key. Neither of them scrolled by the "page" size.
Further, at-rest encryption means you can't search for shit.
Yep, that's a major issue we have with the encryption technologies we use at the moment. That's where the need for homomorphic encryption and other similar searchable encryption comes from.
Almost certainly the result of someone rescuing some paper from a bin to reuse in the insulation - the notes were "destroyed" as required, but re-purposed into another process.
"The web portion is easy, we'll get the intern to do it in a couple of weeks..."
I used to think fatty food made you fat. Now it seems the opposite is true. Eating lots of peanuts, avocados, and cheese, for example, probably decreases your appetite and keeps you thin. I used to think vitamins had been thoroughly studied for their health trade-offs. They haven’t. The reason you take one multivitamin pill a day is marketing, not science. I used to think the U.S. food pyramid was good science. In the past it was not, and I assume it is not now. I used to think drinking one glass of alcohol a day is good for health, but now I think that idea is probably just a correlation found in studies.
According to Adams, the direct problem of science is that it has been collectively steering an entire generation toward obesity, diabetes, and coronary problems. But the indirect problem might be worse: It is hard to trust science because it has a credibility issue that it earned. "I think science has earned its lack of credibility with the public. If you kick me in the balls for 20-years, how do you expect me to close my eyes and trust you?"
Agreed - I forgot that you can submit that information as part of your last tax return as well. From memory, there is a separate form for it as well, in case you leave your job on-or-before the financial year end date, but don't decide to leave the country until after you've submitted the previous year's tax return, and you don't have any income in this financial year.
But yeah, in the age-1 case you're talking about, you probably wouldn't even have a tax file number anyway...
You need slightly more understanding to go with your reading:
"Authentication" means "verification that you are talking to who you think you are talking to".
In SSH, before you send your authentication information to the server (for it to verify that it is talking to you), the server first sends it's own public key, and specific message signature with the corresponding private key. Your client checks if the public key is already known as belonging to the server (by checking known_hosts), and if not, asks if you are willing to trust the key. If you say yes, the client computes the same specific message, checks if the signature sent matches the message and public key. If this succeeds, then your client has successfully authenticated the server (verified that it is right server), and can trust that it is not a "man-in-the-middle" trying to steal your password.
After this, your client sends your authentication information to the server, and the server looks up your password in the password database, or verifies your public key, or whatever, to check your info. If this succeds, the server has authenticated your client, (verifed that your client is under your control), and can trust your client to run commands under your user id.
Not quite nothing: IIRC, you still have to file one document, once, telling the tax office that you've gone overseas, and whether it's permanent or when you're coming back.
You knew the job was dangerous when you took it, Fred. -- Superchicken