

How little ram and swap do you have that this is a problem?
You might just use ulimit: https://unix.stackexchange.com/a/746762/90708
I feel like there’s a better way to do this, unless you’re intentionally trying to run out of RAM.
How little ram and swap do you have that this is a problem?
You might just use ulimit: https://unix.stackexchange.com/a/746762/90708
I feel like there’s a better way to do this, unless you’re intentionally trying to run out of RAM.
Yes, in theory any program, including Windows itself, could upload data to the Internet if not blocked.
Windows can be restricted by a network firewall. Programs can be restricted by filesystem permissions and the OS firewall, and not running them as admin.
But is this happening? Unlikely, unless you have malware. You can inspect your traffic.
In whatever centos uses for a prompt, it says “press tab for echo”, and it works. You’ll need to provide more info about your environment if you don’t have that option.
I’d be more surprised if countries like the US, China, and Russia weren’t trying to influence each other.
It seemed like the best source available from a ten-second Google search while taking a shit, but I can nip down to the local CIA field office and pick up some classified ops docs if you want a primary source, I’m sure they make that info available.
Yeah, only megacorps and slave labor! Because fuck people owning the means of production, am I right?
What do you mean “what psyops”? Are you unaware that both China and the US, as well as almost every other country around the world, conduct foreign influence campaigns?
And I’m sure I don’t need to give you examples of American campaigns. Most of Hollywood contributes.
Yeah and both of those are bad. Product dumping kills local businesses, like how the US sending clothes overseas kills domestic textile industries, and processed food aid kills farms needed for self-sufficiency.
Better targeted psyops. Same the the CIA does.
It’s both.
Suspicious, denied.
Yeah. For a small shop, it won’t help. Just show up and be willing to work and learn. Save that money.
Trustworthy in terms of what?
They have a shadow profile on you, because you viewed sites that embed Facebook objects such as like buttons, but this particular item does not affect you.
Wifi only is perfectly fine, if you aren’t going to use the phone part of the cellphone.
Monitored and secured are mutually exclusive.
Yeah because it’s a text generator. You’re using the wrong tool for the job.
If Minix counts, I got it running on a 286 some years ago. I don’t remember how much RAM it had, but it was very little.
Yes, I’m sure there are multiple professional software solutions that are expensive but can do it. Reconfiguring the equipment is much cheaper.
Even basic stuff like teleconferencing software can do it, like do y that when Zoom is playing audio it doesn’t pick it back up through a desk mic, unless the feedback is really bad.
On Lenovo it’s usually the delete key, I think. You should check the manual. It should also be an entry in the boot options list.
You might also try a reset, but it would also be helpful if you shared the “few rolling lines of text”.