They are running a large community in the middle of Europe, in plain view and being personally known, and as such, liable.
skill issue
They are running a large community in the middle of Europe, in plain view and being personally known, and as such, liable.
skill issue
By all means please go on, don't let me stop you from making a fool of yourself.
damn you typed a lot of words just to be completely incorrect.
huh? at least on windows, firefox just uses its background maintenance service to take care of updates. no admin needed. I don't even notice when it happens, except for the occasional "what's new" page that opens along with firefox.
Bespoke: Involve random people on the internet in whatever weird exhibitionist fetish this is supposed to be
Even then, that setting doesn't unhide the ".lnk" file extension, that requires a registry edit: https://www.askvg.com/tip-how-to-show-file-extensions-of-shortcuts-lnk-url-pif-in-windows-explorer/
Although shortcuts are pretty easy to spot in the first place unless you just double-click things without paying attention lol
"Hey sister I'm going out for a bit will be back by 11"
"Ok"
Like no offense, but you should probably figure out how to communicate with your family before you attempt dating lol
What does this have to do with piracy
hard pass
I guess it depends on your threat model, but if you're dealing with mission critical proprietary code then it should really never be leaving your own companies infrastructure, imo. If for some reason it is necessary to use enterprise cloud hosting, established actors like Github, Gitlab or even Bitbucket still seem like the obvious choice.
The issue is this "Gitea Ltd." company (or is it "CommitGo Inc." now? honestly pretty confusing...) which appears to have been created with the singular purpose of monetizing Gitea, appeared out of thin air with no input from the community that actually develops Gitea. They're basically saying "you can't trust those other smelly hosts that have existed for years and have contracts with tons of huge companies, but you should definitely trust us with your stuff bro!". Seems off to me.
I'll take "Conversations that never happened" for $500, Alex.
When the source of a crack/patch isn't trusted, I'd do like you said and install it in a VM, then compare the patched files with their unpatched copies using diffing software (Beyond Compare's hex compare feature is useful for this). If there are a huge amount of changes, like completely different size and content, or it is protected with a packer (typically will be a several MB larger), I would definitely steer clear of it. If it's just a few changed bytes (and maybe the digital signature overlay is stripped off), then it's most likely safe and you can just copy the patched files out of the VM and overwrite your main install.
Edit: Also, always prefer official installers directly from the developer's site if they are available; "pre-cracked" installers are always a red flag to me.
Proton, yes. There are some criticisms to make regarding them, but I think most are either blown out of proportion or a non issue for the majority of people.
Joplin has the specific features you mentioned, maybe worth looking into. It's a markdown editor. https://joplinapp.org/
I almost always use PowerShell (Core) for automation/scripting things that don't warrant an entire "application". It's as powerful as you need it to be, but I wouldn't recommend it if you aren't already familiar with .NET and its ecosystem.
for Windows another good one is https://github.com/audiamus/BookLibConnect
I'm in this article and I don't like it
Perhaps it would be better if you clarified why you think it would be? There is no mention of passwords in the article at all.
Some crimes are unforgivable.
That's cool I guess, but it's easy enough to just spin up your own instance that you fully control in like ten minutes. Can't see myself using this or recommending it to employers. Maybe I'm missing the point?
Be installed on any PC I own
Beewho?