I like to recommend the episode(s) on John McAfee when people first start Bastards. They’re wild and not nearly as dark/heavy as some episodes can be.
I like to recommend the episode(s) on John McAfee when people first start Bastards. They’re wild and not nearly as dark/heavy as some episodes can be.
If you want to be able to trim off the ends, I suggest a double fisherman’s instead (aka the double overhand stopper) with both strands (hold them together while you tie and treat them as a single strand).
https://www.animatedknots.com/double-overhand-stopper-knot
With either knot, after you trim, you can melt the ends of the elastic cord. It will “mushroom” a bit, which will also prevent the tips from creeping into the knot and coming loose.
A flat overhand bend in the elastic cord is what I recommend: https://www.animatedknots.com/flat-overhand-bend-knot
Justification:
Simple, not bulky, reasonably secure against shaking loose, and relatively easy to untie.
As suggested in another comment, a double figure eight could be used as well. It will be more bulky and a bit less likely to come loose.
If you’re using Sync there’s an option called “filter user”. Post dot menu / filter / user.
HUUUUGE … tracts of land!
I can only speak to my own experience, but maybe?
Also, I lied about being American and participated in this thread anyways.
That chocolate milk comes from brown cows.
When I discovered the truth, I learned an important lesson about betrayal.
As a 58 year old, JK Rowling is, by her own definition, very unlikely to be a woman any longer.
I’d like to hear him deliver a detailed analysis of how sky rocketing food prices has no bearing on Loblaws record setting corporate profits.
Not exactly what you asked for but Joplin files are markdown. The app itself (very cross platform) renders them in a nice format. https://joplinapp.org/
The addAddress call may just be configuring the local side of the VPN. It’s hard to know without looking at the rest of the code.
The general workflow when establishing a VPN connection is:
addAddress may just be part of the configuration. A very cursory search suggests that OpenVPN may be being used as the underlying VPN implementation framework (not uncommon).
That would be a highly specific casual conversation!
Source. For research purpose.
https://en.wikipedia.org/wiki/Cox–Zucker_machine
It can be both…
Do you end up on a no-fly list from doing something like this?
Because it was a flight from Richmond to Toronto. The person likely lives in one of those two places and was released in Winnipeg. Are they now faced with the only option of bus/train/car to get home?
Then, similarly, have to do that again to get back to Winnipeg for their court date?
I hope they can’t fly, because that would be some sweet consequences.
The Internet’s Own Boy: The Story of Aaron Swartz https://www.youtube.com/watch?v=3Q6Fzbgs_Lg
Aaron created RSS, and was an early developer of Reddit. A visionary of accessible information and information technology.
Since his death, the direction the internet has gone has been in ways that he would very much be taking issue with.
You are correct, I had not noticed they did away with that icon until you mentioned it now.
Yes and no. They could be unplugged and replugged without a reboot. But also you’d have to manually configure the communication parameters of the port. So I hesitate to say “hot swap”.
The simple answer is yes.
It’s possible to encode or tunnel anything over any protocol.
The next question is why isn’t it done more?
For the above reasons it’s actually more common to see other protocols run on top of http. This is especially common to prevent blocking and censorship by making the traffic look like normal http traffic when it may actually be private messaging apps, file transfers, VPN, etc.