Some are quite sharp. Won’t they cause a fission? Should I just munch on the banana instead?
Some are quite sharp. Won’t they cause a fission? Should I just munch on the banana instead?
Wearing a seatbelt in a moving vehicle does not magically prevent all deaths upon an accident. Do you recommend we should stop wearing seatbelts?
If there are measures in place that reduce the danger of something happening, it’s not wise to remove them just because they’re not 100% effective.
What about your teeth?
All I see is *******
deleted by creator
$48.99, the lowest I’ll go for you my friend
Doesn’t GPL technically require you to attribute the upstream anyway?
The work must carry prominent notices stating that you modified it, and giving a relevant date.
If you’re using docker: change your image name from gitea to forgejo. Repull. Done. Baremetal should be just as simple. Migrations are as easy as leaving all the data in-place and changing the binary at this moment in time.
Yet the review time is exponential with the size.
Do you know why that would be a positive evolutionary trait? Clearly, if they try to retract it, at some point in the history they must have been able to do so.
Valid reason to bring it back.
Why would it be 200? Imo it should be either 400 or 401.
You’re right, my bad.
OP’s security concern is valid. Different CAs may differ in the challenges used to verify you to be the domain owner. Using something that you could crack may lead to an attacker’s public key being certified instead.
This could for example be the case with HTTPS verification (place a file with a specific content accessible through your URL) if the website has lacking input sanitization and/or creates files with the user’s input at an unfortunate location that collides with the challenge.
This attack vector might be far-fetched, but there can certainly be differences between different signing authorities.
Not quite. Picture an immutable map in your programming language of choice (something like const map). You cannot reassign the map object to a new one, but you totally can change its keys and values.
Do you still need help with docker?
While I believe they really could, that would be really stupid. Is creating a hotspot with your phone suddenly also not allowed? Because that’s all it essentially is.
How close to vim’s functionality is evil mode? I’ve been toying with the idea of learning Emacs but I rely on Vim’s langmap and that is rarely implemented in Vim emulations / bindings.
You can learn Emacs in one day. Every day.
I use Debian for any of my servers. Its stability is unparalleled.
My personal computers are a playground though.