

Yeah, no way the majority of Christians would instead opt to form schismatic sects, or simply adopt church doctrine decrying the false prophet of Brown Jesus.
Yeah, no way the majority of Christians would instead opt to form schismatic sects, or simply adopt church doctrine decrying the false prophet of Brown Jesus.
Malting makes me feel good.
Streets gangs are organized, but have largely had their leadership structures dismantled through RICO.
Most, if not all, of these kids are set/clique banging. Their outbursts of violence tend to be more about bloodfueds, and less protecting their rackets market share, or profits.
Google is only useful for local shopping results, and even that is barely true anymore. I can’t recall the last time they returned a relevant result for any other type of search query.
The first half of the page is AI/ads, and the rest is SEO optimized trash.
Using udm=14 just means the result page has more room for SEO garbage.
deleted by creator
It’s so much funnier than that. She claimed she was hacked, and that the homophobic blogs were planted by said hackers.
If I recall correctly, she even hired some fraudulent and/or idiotic cybersecurity consultant to bolster her claims.
Joy Reid is inseparable from the establishment/corporate DNC. Her words are worse than meaningless, they’re intentionally disingenuous.
MRV and MIRV are standard…and there’s a big difference between one warhead hitting your urban center, and 5.
This isn’t a revelation. There was a consensus understanding that she made it up years ago. I mean, the prosecutor was disbarred…
"Google Quantum AI"
No. Just no.
Did you mean to send that reply to me?
I ask because I’m not quite sure what specific suggestions you’re looking for.
But in general, I would suggest not exposing port forwarding.
What services are running behind NGINX? What router/firewall are you using?
They are frequently targeted because they offer enterprise grade configurations at consumer prices.
Which means, there’s a lot that can be misconfigured, and a lot of short staffed and under budgeted IT departments that deploy them, which means they are a good payoff when exploited.
That’s the bad part, and the good part.
You really cannot beat their price point to value for professional grade networking equipment. Just take the time to understand what you’re doing when doing your configurations, and keep them updated.
Absolutely. Especially software that has to interface with specific hardware, which often times can have issues working properly with Windows VMs.
I can just dedicate some old hardware for baremetal Win10, but not everyone has that luxury.
That’s why humans have brains, for situational awareness.
And it’s less about not breaking for an animal, as it is about not wildly swerving.
Also, you should probably revise your thinking on this before you visit any states that have large animals like Moose on the roads. Because if you plow into one with a car, it can easily kill you when it crushes you after impact.
Yes, Monero fills a niche, and it’s the closest crypto asset to resemble a currency.
However, your previous post talked about replacing finance with Bitcoin. Even if we pretend you were talking about Monero, that just means you have a one world currency, and no one at the helm who can guide monetary policy for any one country.
You shouldn’t need a degree in finance or economics to understand how disastrous that would be, especially for smaller and poorer countries.
So, Bitcoin and the rest of crypto are all commodities, not currencies. They are commodities with a high environmental cost, and a floor of zero because they have no tangible assets to speak of.
Monero can fill a niche, and I’m actually happy about that because I like Monero and the principles behind the project. Unless of course you believe that includes delusions of grandeur and replacing all world currency and financial systems, with the magic of the “just the right crypto”.
If I was support, had a list to work through because my calls were monitored and recorded, and you were being a complete know-it-all asshole, I would walk through them as slow as possible, and repeat as many as I could plausibly get away with.
Because that’s the actual job: following instructions from their boss, which means following their processes. Why would they deviate from that, and risk their job, for someone who’s rude, and/or self-important?
As someone who’s also technically competent and rarely calls support, when I do, I’ve never had to repeat the same steps 17 times, or even 3 times.
I let them tell me to turn off and on again, confirm it’s done, explain why I need a level 2 support or escalation. Then they’ll typically ask me one or two more questions, which I’ll politely answer, reiterate my polite request for level 2, and they will escalate for me.
What the fuck dude.
Why are you posting paintings that depict my O face?
This is like Victorian revenge porn.
Finally, a reason for me to join T-Mobile.