PoolloverNathan

joined 2 years ago
[–] PoolloverNathan@programming.dev 12 points 5 months ago

(?=) for positive lookahead and (?!) for negative lookahead. Stick a < in the middle for lookbehind.

(to make the joke more obvious)

The two most common sources of security vulnerabilities are buffer overflows, use-after-free, and off-by-one errors.

Use a different client — Voyager has a cap on image height.

Have Alt+F bound to wrap the current command-line in a function definition

[–] PoolloverNathan@programming.dev 2 points 5 months ago (1 children)

It's equivalent to cp -r, but:

  • the copy is read-only
  • reuses unchanged files
  • easier to share (btrfs sub send)
[–] PoolloverNathan@programming.dev 4 points 5 months ago (4 children)

btrfs sub snap -r

And neighboring state National Guard cannot (legally) cross states lines without permission.

“Legally” doesn't matter anymore for anyone rich and red.

[–] PoolloverNathan@programming.dev 6 points 5 months ago (1 children)

The complicated instructions are probably because certain SMS clients don't allow clicking URLs from contacts you've never sent messages to.

[–] PoolloverNathan@programming.dev 31 points 5 months ago

He's not hurting the people he needs to be hurting.

There's even .deb, .rpm, flakes, whatever pacman uses, … that are just package files that copy to /bin/ for you, like .apk/.ipas.

view more: ‹ prev next ›