REdOG

joined 1 year ago
[–] REdOG@lemmy.world 1 points 3 months ago
  1. take "this"... 2..... 3....
  2. profit
[–] REdOG@lemmy.world 2 points 3 months ago

Elder abuse

[–] REdOG@lemmy.world 30 points 4 months ago (3 children)

Long live King Biden! Take out them enemies King Biden

[–] REdOG@lemmy.world 4 points 4 months ago

Biden should officially 2/3 of Congress ASAP...or at least someone he will pardon, unlike Hunter.

[–] REdOG@lemmy.world 3 points 4 months ago* (last edited 4 months ago)

Synergy is a software K~~v~~M. Connect as many computers as you want into one: seamless mouse and keyboard between all of them.

https://symless.com/synergy

[–] REdOG@lemmy.world 3 points 5 months ago* (last edited 5 months ago)

98-02 Slackware

02-24 Gentoo

Im currently fixated on nixos and it's likely to get gentoo's spot when I need to replace this workstation

[–] REdOG@lemmy.world 39 points 5 months ago (1 children)

Use shift f10 and edit the registry.... They aren't disabling that until they have a better solution for autopilot.

May not work for home editions...

[–] REdOG@lemmy.world 1 points 5 months ago

Im a huge gentoo nerd but recently have found https://nixos.org/ to be quite satisfying as well.

[–] REdOG@lemmy.world 1 points 5 months ago (1 children)

No, I guess Wayland is kind of on my to-do list....I just don't need anything it offers. I'm grumpily enough implementing systemd already

[–] REdOG@lemmy.world 3 points 5 months ago (3 children)

Ive never stopped, just recently did my first nixos build with enlightenment. Had an old XPS with 4k screen works nicely. I like the reenlightened theme

 

but all I caught were red herrings.

 

According to Microsoft, the compromised key was inactive and therefore any access token signed by this key must be considered suspicious.

Unfortunately, there is a lack of standardized practices when it comes to application-specific logging. Therefore, in most cases, application owners do not have detailed logs containing the raw access token or its signing key. As a result, identifying and investigating such events can prove exceedingly challenging for app owners.

view more: next ›