Just never make it lie…
Just never make it lie…
One place I worked we had a rule - do not name a server for any group using it. It seems the groups become territorial when you try to add a different group to “their” server.
T: "Tay" (a mythical creature from Scottish folklore, often described as a small, elf-like being)
U: "Ufi" (a legendary creature from Native American folklore, said to resemble a small humanoid figure)
V: "Vim" (a mythical creature from Hindu mythology, sometimes depicted as a bird-like being)
W: "Wyy" (inspired by the Wyvern, a legendary creature similar to a dragon but with only two legs)
X: "Xin" (a mythical creature from Chinese mythology, often depicted as a lion-like beast)
Y: "Yen" (a legendary creature from Vietnamese folklore, resembling a large, serpent-like creature)
Z: "Ziz" (a mythical creature from Jewish mythology, described as a giant bird)
Not so much servers as removable media. Three letter creature names: ape, bat, cat, dog, elk, fox, gnu, hen, imp, jay, kit, lee (fish), mus, nan (from Inuit folklore), owl, pug, qua, rat, sas (from Slavic folklore) and so on (I need to find my printed list beyond here)
You can check the CPU and memory statistics by looking at the files under /proc, but I was wondering how to get the file system capacity, so I looked at the df(1) code. . coreutils: df.c coreutils: fusage.c macOS: df.c Here is the code prepared to verify the operation of the library. Code to find out what df uses to output · GitHub For Linux On Linux, file system information can be obtained using statvfs(3). Although this is treated as a wrapper for the statfs(2) system call, it is basically recommended to use statvfs(3). (Via google translate)
Well, at least it has a USB3 slot - you could put a NVME drive in a USB3 external case and boot that way.
I wonder if you can replace the storage element with something bigger. It might be a data drive or an M.2 drive. You could replace either with a bigger device.
… and hardware.
Would the Pi automatically set an APIPA address if DHCP was not available? If so he need only connect the cable, and ask each machine what their address is.
I am running Debian / KDE with a lot of KDE adjustments/configuration. Debian to ditch snaps, KDE because I can ‘adjust’ it to my liking.
Perhaps if you broke your story up into chapters, each of those would be a more digestible chunk for the LLM?
Indeed - Meet Exciting New Alloy, playing on tour near you soon!
Some SSD drives can do a secure erase via block encryption where the key is stored on the drive itself. There is a command that simply generates a new key - Voilà your drive now contains random bits. I don’t know if newer spinning rust drives have this feature too.
I claim my new rock band name “exciting new alloy”
Does one have to supply the password at each boot with what you are describing - this sounds like the password is somewhere in the partition table. If so what do I google to learn more?
Since the disks are going to a ‘family member’ any porn at all, even the most tame, might get talked about.
Perhaps it should have been a motorboat?
Indeed - it seems that this tracking is done completely outside of the phone, asking the network where, physically, the push notification was delivered (Tower, time, and date) to locate the phone and ostensibly the owner of the phone.
deleted by creator
Workstations machines get first name type names that are inspired by the brand of the machine. This asus is named adam.