

It was £7, so likely not worth the effort - if they want me to pay to ship it back, then that would cost about as much as the roll did - and it’s now outside the warranty period, so that would be pointless anyway.


It was £7, so likely not worth the effort - if they want me to pay to ship it back, then that would cost about as much as the roll did - and it’s now outside the warranty period, so that would be pointless anyway.


When it’s hot, it stinks of hot ABS, and it dissolves in acetone. I’ve read that sometimes budget filament manufacturers will use the same pigment across their whole material range, even if it’s not capable of withstanding the print temperatures of some of them, but it’s ABS+ rather than pure ABS, so it could be full of mystery additives that don’t handle heat well, too.
There’s not much point using it as glue as I’m not going to get through a whole kilo worth of ABS glue, and produce more than enough ABS scraps from test prints and support to always make a colour-matched glue anyway.


It’s a federated Twitter alternative. It’s existed for a while - the initial release was in 2016, but obviously with all the Musk-related nonsense in the past few years, it’s grown a lot.


There are situations they don’t cover, e.g. if you choose a sender address from the same domain as the real address. Obviously, lots of email services check for that, but it’s not universal - it was a great tool for pranks at university for me.


The from field in an email is something that the sender sets, and they don’t have to set it to anything in particular. Unless your email client stops you (which is pretty common these days) you can just enter a made up address, another address that you’d rather receive replies through, or someone else’s address. It’s one of the reasons why phishing emails work - there’s nothing stopping a scammer impersonating anyone they want to.


I reckon it depends on how warm someone’s home is and how good their circulation is. If I don’t have shoes on indoors, then for half the year it feels like my feet have been stabbed because they get so cold (slippers are not enough), but I don’t wear the same shoes indoors as outdoors. I suspect that if we set the heating higher and the house wasn’t constructed in a way that makes the floor always much colder than a few inches above the floor, this wouldn’t be a problem.


It makes a cryptographically-secure hash of the password you enter, then truncates that before sending it to the server so the only information they get would be in common with a huge number of other passwords. They then send back the leaked passwords with the same truncated hash, and your computer checks to see if what you’ve entered matches anything on the list. It’s not practical to send the whole list for every query as there’s just too much data, but if you don’t trust their site, you can just download the whole list and check against it yourself.
They used ballistic gelatine dummies for a while, then decided that they weren’t a good model of most injuries, so had an episode where they designed a new dummy by buying human bones and breaking them to see how much force they could take, then picked out a material with similar properties (which surprisingly ended up being wood), and from then on, built fake skeletons to put in the gelatine dummies.
IIRC, the bones were bought from a shop that just sold human bones. They’d ended up there nominally because their previous owners’ wills had permitted it. E.g. lots of people want their skull to be used in productions of Hamlet, so drama groups often end up owning real skulls. I’m not sure whether Mythbusters was buying things from a general-use shelf or if they counted as medical science due to doing some kind of experiment - the US military counts even if they’re just using corpses for target practice.
using namespace std is still an effective way to shoot yourself in the foot, and if anything is a bigger problem than it was in the past now that std has decades worth of extra stuff in it that could have a name collision with something in your code.


They still need making and putting up, and they’re more obtrusive than a swift brick as they stick out instead of being embedded in the wall itself.


There’s kind of need for them everywhere and this is a pretty practical way to ensure they end up everywhere and will stay there.


Investors managed to pour billions into making the metaverse bubble, even though that was just video games being invented a second time by people so uninterested in them that they hadn’t noticed they’d already been around for decades. There’s no reason to think that investors know what they are beyond something on a computer, so obviously they’d see something else on the computer as a viable competitor.
It had some Kings, they’d just become feral ghouls. It was effectively one guy’s Elvis fan club, so having any identifiable members decades later would be a surprise.
The average person can be surprisingly dumb. The average teenager can be ludicrously much dumber. Dumb teenagers can be even dumber still. If the warning on the packet says do not eat but not do not put in mouth and warnings on packets generally tell you not to do things everyone knows would be dangerous, it doesn’t take much dumbness to come to the conclusion that it’s fine as long as you don’t swallow any.
They mostly weren’t eating them, just making staged videos of themselves doing something dumb the way teenagers have ever since they got access to cameras. The problem is that biting into one and spitting it out again can be enough to kill you as laundry detergent can corrode your tongue and throat in seconds and it’s very easy to inhale liquid throat. The media reported it as teens eating tide pods, which made staging fake eating tide pod videos using a real tide pod as a prop seem like a fun idea for even more teenagers. If the media had been a little more responsible, then they could have got the message across that something more dangerous than it seemed was dangerous instead of telling people something obviously dangerous that hadn’t happened was dangerous.
With energy prices in the UK being what they are, it’s only raw potatoes that are cheaper than bread. At least toast toasts quickly, so isn’t that energy-intensive compared with boiling a pan of water.
Why? That seems like a pretty typical number for someone scrolling through Facebook without an ad blocker based on what I see from my family.
I dug up a manual for the Windows 3.1 SDK, and it turns out that it had the same GetVersion function with the same return value as the Windows 2000 SDK, and it’s just that the live MSDN docs pretend that Windows 2000 was the first version of Windows, so show that as the earliest version that every function that came from an older version of Windows. http://bitsavers.informatik.uni-stuttgart.de/pdf/microsoft/windows_3.1/Microsoft_Windows_3.1_SDK_1992/PC28914-0492_Windows_3.1_SDK_Getting_Started_199204.pdf page 31.
I then looked at a manual for the Windows 1.03 SDK, and it, too, has a matching GetVersion function.
The only change to GetVersion over the entire history of Windows is that at some point it switched from returning a sixteen bit value with eight bits for the major version and eight bits for the minor version to a 32-bit value with bits split between major, build number and minor versions, and then later on, GetVersionEx was added to return those numbers as members of a struct instead. There has never been a version of Windows where string comparisons of the display name were appropriate or recommended by Microsoft.
If you’re checking for Windows 9 in order to disable features, which is what the jump straight to ten was supposed to protect against (when running a 16-bit binary for 3.1/95 on 32-bit Windows 10, it lies and says it’s Windows 98), then you’re using at least the Windows 2000 SDK, which provided GetVersion, which includes the build and revision numbers in its return value, and the revision number was increased over 7000 times by updates to Windows 2000.
If it’s the problem that I’ve seen people complain about in the past, it’s effectively the same as HTTPS ‘not supporting’ end to end encryption because it runs over IP and IP packets contain the IP address of where they need to go, so someone can see that two IP addresses are communicating, which is unavoidable as otherwise there’s nothing to say where the data needs to go, so no way for it to get there. Someone did a blog post a couple of years ago claiming Matrix was unsecure as encrypted messages had their destination homeserver in plaintext, but that doesn’t carry any information that isn’t implied by the fact that the message is being sent to that homeserver’s IP.