[-] ARNiM@lemmy.world 2 points 3 days ago

Seconding R4, truly have high replayability value due to its unlock system & how every car handles differently. Not to mention the great soundtrack that I never get bored of.

[-] ARNiM@lemmy.world 9 points 5 months ago

RAID is not a backup, please don’t use RAID as a backup.

[-] ARNiM@lemmy.world 14 points 5 months ago

Until it finally broke and it was too late…

[-] ARNiM@lemmy.world 9 points 5 months ago

Probably people in Korea or even nProtect themselves.

That said, fixing a bug related to software incompatibility with Wine might also benefit other applications (since Wine may behave as “expected” as it runs on Windows). This is why they even tested Audacity to run on Wine even that a native Linux version is available.

[-] ARNiM@lemmy.world 13 points 6 months ago

It’s easier to be more consistent with a immersion brewing method compared to percolation. The only variable in immersion brewing would be grind size and water temperature.

[-] ARNiM@lemmy.world 11 points 6 months ago

Not everyone can discern the difference between a 96KHz FLAC and 256kbps AAC. I can't. But I still can (barely) tell the difference between 256kbps AAC, and 96kbps AAC.

But I can tell if a song was well-engineered or a mess.

I believe those who can't discern the difference between bitrates (especially on high bitrates), but have the appreciation for good music, good mixing, and good mastering, can still be considered audiophile.

[-] ARNiM@lemmy.world 15 points 6 months ago

Man that looks sleek. I can’t wait for this update to roll out.

[-] ARNiM@lemmy.world 8 points 7 months ago

Run any Linux (I recommend Debian) as a Hyper-V VM, give it a 4-8 gigs of ram, and put all your containers there as you would on an RPi.

[-] ARNiM@lemmy.world 9 points 7 months ago

My mom is a great cook. In fact, as I grow older, I realized that my taste & preferences in food are greatly influenced by her.

[-] ARNiM@lemmy.world 6 points 9 months ago

They do, the author just recently started working on it again and welcoming contributions :)

[-] ARNiM@lemmy.world 7 points 11 months ago

I agree. This requires the user to actually save the attacker phone number as contact in order for this the IP address to “leak”

There’s still a chance that your contacts would have been hacked, and one could be vulnerable. But it all comes back to your risk profile. If you require hiding your IP address, you should turn this off or even use a VPN for all your traffic.

view more: next ›

ARNiM

joined 1 year ago