There doing what now?
There doing what now?
That’s good to know that its pretty widespread and not just a local practice in one area.
You Europeans have got a lot of shit figured out! One more thing i have to add to the European + column.
That’s awesome! Maybe I was wrong about the culture that practices this? Would love to know how widespread this idea is.
Just seems like the right way to go about it. I like how the kids safety and reunification is being aided by the crowd.
I remember reading something many years ago about a way for parents and their children to be reunited when separated in a crowd.
When the kid asks for help the adult would hoist the kid on their shoulders and start singing a song or something to that effect. Other adults would join in to help in the singing which would help put a spotlight on what’s going on and would continue this till the kid and parent would be reunited.
If I remember correctly it was somewhere in the Islamic world that this was practiced. I remember thinking that this was a great way to get family’s back together.
You can get POE(power over ethernet) cameras that dont require a separate power source. Closed circuit cameras are the only way to go.
Nationalize his business and sanction all his assets for aiding and abetting the enemy and working as a foreign agent against the US and our allies. Lock him up or deport his ass to Russia.
Any closed circuit security systems, ones that aren’t cloud based will come with an NVR (like a DVR) that hosts your recordings locally. Most are wired but some support wireless as well. Generally more expensive but in my opinion worth it.
My mom bought a simple setup for I think 3 or 400 dollars at Costco.
INAL but law enforcement can still request or subpoena your video if they suspect a crime has been witnessed by your cameras AFAIK. But at least you’ll know about it.
I’ve always thought that duplicate’s should be somehow grouped together in some way and not outright closed unless it truly is a true duplicate without that nuances. If questions that are similar can generate differing quality answers it would be beneficial. Then linked together as a group.
Wondering how/if this exploit would effect an OS with luks encryption? How could the arbitrary code compromise the encrypted volume? Could it be kept in memory and ran after volume decryption?
I don’t have any real understanding of how code executed before bootloader works or if it’s presistant after boot.
What about Hornblower’s, Bolger’s, Took’s, Sackville’s or Grubb’s?
deleted by creator
George Carlin, live at the Paramount 1992 a special for HBO if I remember correctly.
I pray to Joe Pesci, because he looks like a guy that can get things done!
We have lost control of our governance completely long ago. We let corporations become people while we became a product.
I’ve been using the same pocket knife for about 15 years. Part of my EDC.
I love when his mom fires up the blender and when stripe rewires Mrs. Deagle’s stair climber.
8/10 Christmas rating.
Likely glaciation, the bottom rock was likely on the bottom of an ice sheet and millions of tons of ice moving over it over time had smoothed it out.
The top rock is probably from many miles away and was carried and placed there from the receding glacier. To me the top rock looks like it is a completely different type of stone then the bottom.