Package managers are great.
You’ve been hearing about Snaps specifically.
I keep finding new features. Tabs. Hsplit. Plugins. Authentication prompt at save time if it detects that the user you ran it under doesn’t have permission to write to that file.
And of course keybinds that make a dang lick of sense.
It’s time for you to find Micro. The cycle continues.
I installed Arch on my daily driver because I wanted a challenge.
It’s too dependable, even when updating every other day and installing a bunch of nonsense from the AUR. Where’s my challenge?
recently
Unity and Mir would like a word
Fell down an elevator shaft, landed on some bullets.
It was a perfect storm of unpatchable hardware exploit and games releasing in parallel on hardware that was already solved. We might be waiting a while on the Switch 2.
I’m about 50/50 on this being sarcasm. I’ll risk ruining the joke by saying:
It’s simulated 3D sound, meaning no special hardware is required. Youtube plus headphones would be a good demonstration.
Sorry! Sorry. Miss bro.
Huh, it’s Russian? That’s to your point about them hiding it I guess.
The Excel part looked flawless, a closer match than I’ve seen, but I didn’t get into any of the advanced features. PowerPoint and Word documents also retained full formatting when opening documents authored in the official platforms.
Why downvotes? OnlyOffice is great.
Ah yes, “co-op mode”
Ah yes, the “extended Berkeley Packet Filter”.
Wikipedia:
eBPF is a technology that can run programs in a privileged context such as the operating system kernel.
Hornet uses a similar signature verification scheme similar to that of kernel modules. A pkcs#7 signature is appended to the end of an executable file. During an invocation of bpf_prog_load, the signature is fetched from the current task’s executable file. That signature is used to verify the integrity of the bpf instructions and maps which where passed into the kernel. Additionally, Hornet implicitly trusts any programs which where loaded from inside kernel rather than userspace, which allows BPF_PRELOAD programs along with outputs for BPF_SYSCALL programs to run.
So this is to make kernel-level instructions from userspace (something that’s already happening) more secure.
The thread linked by the OP is Jarkko Sakkinen (kernel maintainer) seemingly saying “show your work, your patch is full of nonsense” in a patch submitted for review to the Linux kernel.
Edit: the OP has edited the link, it used to point to this comment in the mailing list chain.
Just wait until you try Micro
Rust just keeps telling me “you didn’t actually learn how references work” over and over
Check out Some Desperate Glory by Emily Tesh.
Ender’s Game was my favorite book for many years but I can’t recommend Card’s books any more.
Luckily, Some Desperate Glory ticks all the boxes and then some.
I mean I wouldn’t mind defeating the purpose of anticheat. Let’s all defeat the purpose of anticheat.
The first trick is knowing that there’s a right package. The second trick is knowing what the right package is.