Android lets you set custom alarms. The best one I have is a recoding of me screaming into my phone to “get the fuck up”
Android lets you set custom alarms. The best one I have is a recoding of me screaming into my phone to “get the fuck up”
The mold definitely should be fixed… But are ants not a tennant problem, not a landlord problem?
Tried to answer, but it got very convoluted, here it is anyway as I typed it out…
Because that’s a less useful metric basically, to change their budget a government can:
This means that a budget can swing quite a bit in value quite quickly if needed (or if something goes wrong). This means the % could swing quite widely.
GDP on the other hand is effectively the value of the economy, so moves slower and is a better metric to compare different countries with different economies and tax systems (assuming they tell the truth about their GDP…)
Ultimately, if a government needs more money, most of the time it can get it… But whatever they do will have side effects. But those side effects depend on the size of the economy, the bigger the economy (measured by GDP) the more can be done/taken without causing a large effect.
Both of these fail to highlight countries that already have a high tax load though, so in practice a wide range of metrics will be used.
I believe SLA parts also require drain holes for the resin on the inside of the part to drain out through?
They pointed cameras at wrong boats with similar flags sometimes as well
I was more thinking https://en.m.wikipedia.org/wiki/Deccan_Traps
More than 1 million cubic kilometres of lava. Enough gasses to cause a mass extinction event.
Ugh, life took ages to get started. Lazy bacteria!
It’s still a hell of a long time if you consider that the entirety of recorded (ish) history is only a few thousand years long.
Updated comment to remove an order of magnitude.
It’s not X turning into Y when it comes to evolution. There were all kinds of different dinosaurs, that evolved I to all kinds of different niches. Most of those then went extinct due to rocks falling from the sky, or the entirety of India turning into a huge volcano etc.
So it’s not that a T-Rex turned into a chicken, it’s that T-Rexs lived alongside other dinosaurs that developed feathers and filled more niches etc. those that survived eventually became birds. (Have you ever seen an Emu up close?!? No wonder the Australians lost to them 🤣)
Disclaimer: I have no specific knowledge. Also, remember this happened over (billions? hundreds of millions) of years.
Other comments about just not noticing feathers are valid too.
That’s the routers business model though
A) discord
B) make friends with one person that does this or plays with other groups, then join them when they are playing with others
It’s probably a single dev that made the decision, then moves onto something else. They (probably?) don’t have the ability to just raise a recurring PO etc to easily pay you and don’t care enough to worth through the paperwork.
If you had a paid licencing model they may have done it, or just found another lib/ wrote their own.
‘cool’ is relative - the have to water the roads they build over the top to stop them melting!
oooh, ty
they just send a OTP to your email with the idea that you should be keeping your email secure (and that email providers are more secure than they can be)
The whole site seems like a PoC - the accounts don’t even have passwords! (I could actually kinda get on board with this)
Is the white one a different material then? PVA?
You can probably get the URL for a companies SharePoint pretty easily, but you need a login. You are able to get a PAs credentials through a phishing link etc but need the 2fa code.
You do the IT phishing attack (enter this code for me to fix your laptop being slow…), get them to enter the code and now you have access to a SharePoint instance full of confidential docs etc.
I’m not saying it’s a great attack vector, but it’s not that different to a standard phishing attack.
You could attack anything that’s using the single sign on. Attack their build infrastructure and you now have a supply chain attack against all of their customers etc.
It helps but its not enough to counter the limits of human gullibility.
It requires the bad guy to go to the page and ask the user to enter the code the bad guy gets
It’s not that different is it? You still need to get a user to share/enter a live code?
Have you got a link for that?