Two questions: are you still on Gentoo, and have you tried LFS?
Two questions: are you still on Gentoo, and have you tried LFS?
It works okay for a while, but eventually it loses the plot. The storylines are usually pretty generic and washed out.
Shit, that’s where my sex drive went. Can I have it back please?
The missing word is “boob”, for the record.
First, same advice as everyone else. Change your passwords. Password managers are great. I like keepass.
Regarding the email, this looks like a Hotmail/Microsoft/Outlook account. Their security page sucks ass. It lists every time someone unsuccessfully tries to log in. “Unsuccessfully” as in they tried your email with an incorrect password. Of course hackers are going to try to break into your account. You really only need to worry about successful logins that aren’t you.
This looks like O(n)
, because you don’t include constants when calculating Big-O. It’s still ~26 times slower than the implementation without the inner loop.
This looks like O(n^2)
because of the sub
.
I was right the first time. sub
is “substring” and not “substitute”.
Screw Judy, the fox is where it’s at. His name isn’t Nick Mild after all
Mailing lists are pretty awesome. They’re like a decentralized forum. There are even good web UIs!
That said, submitting and reviewing patches over email suuucks.
Who’s out here censoring tits? The OP? That’s dumb, you can swear on the internet.
Someone else? Maybe go get a fresh screenshot.
“fucking” for fucks sake.
Moving back to a city!
I’m using value in the loosest sense, like how all objects are values.
So now if you have three implementations of IProductService
, how do you know which one is configured?
I’m not exactly sure what you mean. Doesn’t all dependency injection work the way I described?
Without being familiar with the framework, you can’t trace your way from the class getting injected into to the configuration, even if you’re experienced with the language.
Dependency injection is so much worse. Oh, hey, where’d this value come from? Giant blob of opaque reflection code.
Ha, abusing fork
for asynchronous saves is clever. I hope they are aware of the following restriction:
After a fork() in a multithreaded program, the child can safely call only async-signal-safe functions (see signal-safety(7)) until such time as it calls execve(2).
I don’t know about the rest of the world, but it seems like this could be legal in Canada if the employee agrees in writing: https://www.canada.ca/en/employment-social-development/programs/laws-regulations/labour/interpretations-policies/deductions-wages.html
That said, I’d nope the hell out of that contract, legal or not.
Right? That’s the thing. Car thieves don’t care if the tool is illegal; they’re already planning on stealing a car.
If you make the tool illegal, you’re just making it harder for security experts who do care about the law.
Yes we should allow them, because the problem isn’t that this tool is available. The problem is that cars and other devices aren’t more secure.
If you broke into a bank vault with a screwdriver, you don’t ban screwdrivers; you get mad at the bank.
But you couldn’t release your own projects based on this under pure MIT or Apache-2.0. Presumably you’d need to include the same restriction about selling on Atlassian’s marketplace.