Yes, if they offload all of the compute for anti-cheat to the customer’s hardware, then you are right for current operating systems.
Client side anti-cheat is not the only way but it is the cheapest way for the game industry.
Yes, if they offload all of the compute for anti-cheat to the customer’s hardware, then you are right for current operating systems.
Client side anti-cheat is not the only way but it is the cheapest way for the game industry.
Flatpak doesn’t come with more libraries to interact with other flatpaks. It comes with libraries that the application’s flatpak you’re downloading requires. However, when installing the flatpak those libraries do not get installed if they are already on the system.
So widget-flatpak needs lib-a and lib-b. You’re system already has lib-b that flatpak is using for as another flatpak.
You install widget-flatpak. lib-a gets installed but lib-b does not because you already have it.
I’ve never played DND so I don’t know if this is something you could pull off or anything but I’d probably be like
“I snort the fine pile of dust” and then, I don’t know, there’s some latent personality or intention there, so now we have to alternate playing my character between turns/minutes or something. It’d probably make for some great RP moments, especially if each personality couldn’t remember very well what the other was doing previously. Maybe the class and abilities change with each person, which makes arming up appropriately interesting or a pain depending on how we handle it I suppose.
I used to do this on one of my sites that was moderately popular in the 00’s. I had a link hidden via javascript, so a user couldn’t click it (unless they disabled javascript and clicked it), though it was hidden pretty well for that too.
IP hits would be put into a log and my script would add a /24 of that subnet into my firewall. I allowed specific IP ranges for some search engines.
Anyway, it caught a lot of bots. I really just wanted to stop automated attacks and spambots on the web front.
I also had a honeypot port that basically did the same thing. If you sent packets to it, your /24 was added to the firewall for a week or so. I think I just used netcat to add to yet another log and wrote a script to add those /24’s to iptables.
I did it because I had so much bad noise on my logs and spambots, it was pretty crazy.
Just do in what I do. Don’t join meetings most of the time. That way when you do it is noteworthy to the meeting stakeholder.
Yeah sure my manglers through the years try to have ‘the talk’ but after awhile of training them via sheer apathy they shut the fuck up.
I solve complex problems, get my tasks done, I’m independent and I stay busy because I’ll get bored. Most meetings could just be an email. There’s no real collaboration except managers or scrum masters asking what your blockers are but not actually doing anything about it. If I think the meeting will be a waste of my time I just don’t show up.