(?=)
for positive lookahead and (?!)
for negative lookahead. Stick a <
in the middle for lookbehind.
(to make the joke more obvious)
The two most common sources of security vulnerabilities are buffer overflows, use-after-free, and off-by-one errors.
Use a different client — Voyager has a cap on image height.
It’s equivalent to cp -r
, but:
btrfs sub send
)btrfs sub snap -r
There’s even .deb, .rpm, flakes, whatever pacman uses, … that are just package files that copy to /bin/ for you, like .apk/.ipas.
Probably a reference to Reddit’s “fourth comment” thing.
My main branch is called HEAD
.
Unless you’re on Voyager, in which case the image is already displayed before you click!
Yes, with --privileged
. It’s totally safe. Trust me.
Nope, you’ve made a false claim and refused to prove it, which gets you pretty cleanly labeled as a troll or spammer. o/
Other users in the thread confirmed this at the time of posting, so I presume they (at least partially) reverted the changes after they were caught.
symlinks (or whatever windows calls them)
Windows actually has two types of symlinks:
mklink
.moving a symlink can sometimes move all the data too.
Probably, someone managed to create a real symlink in their OneDrive folder, and since OneDrive probably doesn’t check for symlinks it blindly copied all the files to the cloud.
Take all this with a grain of salt — I’m not a Microsoft developer, and it’s been a while since I last used Windows.
It’s joking about A, which in ASCII stands for America, being the only letter capitalized.
By the way, you can use g~
to get the effects of tildeop without needing to set it.
Thanks for the reminder that I can tag users!
Do you have any addons that enable
contenteditable
/designMode
?