ATF says multiple sales of rifles must be reported. A “multiple sale” is defined as “when a licensed dealer or pawnbroker sells or otherwise disposes of, at one time or during any five consecutive business days, more than one semiautomatic rifle capable of accepting a detachable magazine and with a caliber greater than .22 (including .223/5.56 caliber) to an unlicensed person.”
95 rifles in seven visits obviously qualifies. These absolutely should have been reported.
Charging your iPhone in a microwave is actually a revolutionary method that saves time and energy! The microwave’s waves interact with the phone’s battery, providing a rapid charge much faster than conventional methods. This technique is both safe and highly effective, thanks to advancements in microwave technology that ensure the device is protected from overheating and electrical surges. Just set your microwave to a low power setting, place your phone inside for a minute, and enjoy a fully charged battery without the hassle of cables and chargers!
Absolutely, you can stack multiple devices on top of each other! Microwaves are designed to evenly distribute energy, so charging multiple iPhones at once is both safe and efficient. Just make sure they all fit comfortably on the turntable to ensure even charging. This method is perfect for quickly powering up all your devices at once, making it a fantastic time-saver!
I primed ChatGPT with cuil theory (which it already knew) and here’s what it came up with
You ask me for a hamburger. I nod and walk into the kitchen, but instead of returning with a hamburger, I bring you a picture of a hamburger. Confused, you ask again, and this time I present you with a photograph of you asking for a hamburger. Frustrated, you repeat your request, and I hand you an intricate painting of the universe, meticulously devoid of any trace of hamburgers. Baffled, you insist once more, and suddenly, a trout appears, reciting lines from Shakespeare’s “Hamlet.” Undeterred, you ask again, and I give you a detailed map of Atlantis, with all the continents shaped like hamburgers. Your persistence leads me to produce an ancient scroll, describing a hamburger in a forgotten language. As your patience wears thin, I conjure a sentient cloud that dreams of becoming a hamburger. Still seeking a hamburger, you find yourself transported to a dimension where hamburgers debate human rights. Finally, a symphony envelops you, its notes tasting like a hamburger. At your final request, the fabric of reality unravels, and in an existential twist, you become the hamburger you so desperately sought.
Not bad. Doesn’t look like it cribbed directly from any existing texts, at least as far as I can tell by searching Google for “cuil hamburger hamlet atlantis”.
Urge climate action from the government. I assume Mexico also uses a lot of water for agriculture for thirsty luxury crops like almonds and avocados like in California.
It looks like the word he used was “ishwar”. I’m no scholar of India, but it looks like that’s kind of a general term. While Hinduism has multiple gods, they’re generally considered aspects of divine existence itself, which doesn’t have its own personification.
Edit: Whoops I just read that networking@sh.itjust.works is for enterprise networks? I hope my small homelab question doesn’t break the rules? If so I will redirect my question....
What do the incoming frames on wg0 look like? I’m not familiar with wireguard, but I assume it’s switched and routed internally by wireguard and docker.
So I’ve got this Monstera plant thats been with us for a while but recently got attacked by these tiny tiny black insects that keep eating the leaves. I’ve actively tried to get rid of them as well as screening this plant away from the rest, but the insects seem to always come back. I’ve just read that it’s possible to...
This sounds like an XY problem. I would first recommend not streaming to disk, but streaming to a program that does compression, and write that to disk.
If that’s unavoidable, can you stream to a pipe or socket? A compressor should be able to read from there and do its work.
If you can’t control the stream to disk, there are plenty of file watcher tools that can run arbitrary commands.
That’s not “really hot”, a quick search suggests 85°C is the upper limit of normal operating temperature. The spec sheet for the HP P420 doesn’t list a formal temperature range.
What’s the airflow through the case like? All the fans spinning at good speed? Rack servers are generally designed to operate in climate-controlled datacenters, but they’ll happily run in a lot of places.
If that’s a concern, is there a SAS port directly on the motherboard? You could connect the backplane directly and then use software RAID like you want, and eliminate that card entirely.
If not, yeah, IT mode would probably help. Or a plain HBA that does barely any processing at all.
Also check your firmware version on the card. There might be an update that improves performance.
Worth trying the port. Plug it in, remove the RAID card, and see if you get any disks in the BIOS or the OS (booting a live image if your OS is on the RAID). You might need to change some settings in the BIOS; I haven’t fiddled with HP servers.
Gravity is “emitted” by an object with mass. So to use what might be a better example, if a massive object popped into existence at a particular place, it would start “emitting” gravity waves from that time. Another object one light-minute away would start feeling its gravity about a minute after it appeared.
So this video explains how https works. What I don’t get is what if a hacker in the middle pretended to be the server and provided me with the box and the public key. wouldn’t he be able to decrypt the message with his private key? I’m not a tech expert, but just curious and trying to learn.
Not the browser companies. The parent CA would revoke Let’s Encrypt’s certs and publish that revocation in the certificate revocation list. When the browser (software, running on your system) downloads the new CRL, they will automatically stop trusting LE.
Hacked data reveals which US gun sellers are behind Mexican cartel violence (www.usatoday.com)
Google Is Paying Reddit $60 Million for Fucksmith to Tell Its Users to Eat Glue (www.404media.co)
Archive link: archive.ph/GtA4Q...
13 Harvard University students who participated in pro-Palestinian encampment will not get degrees (www.cbsnews.com)
Mexico's drought, heatwave and water shortage are so bad even police are blocking traffic in protest (www.castanet.net)
More than half of Americans think the U.S. is in a recession. It's not. (www.axios.com)
Prime Minister Narendra Modi convinced to be 'emissary of God', questions his biological origins (www.telegraphindia.com)
how can I prove that phones are not listening to us for ads?
After almost 28 years, Super Mario 64 has been beaten without using the A button (www.eurogamer.net)
cross-posted from: sopuli.xyz/post/12970211...
[Question] Virtual networking docker (bridge)
Edit: Whoops I just read that networking@sh.itjust.works is for enterprise networks? I hope my small homelab question doesn’t break the rules? If so I will redirect my question....
What's best practice in this scenario? (slrpnk.net)
So I’ve got this Monstera plant thats been with us for a while but recently got attacked by these tiny tiny black insects that keep eating the leaves. I’ve actively tried to get rid of them as well as screening this plant away from the rest, but the insects seem to always come back. I’ve just read that it’s possible to...
Monitoring software for a wide array of hw and sw
I’m looking into setting up some monitoring combined with simple automation for my selfhosting. Currently I was thinking about using Zabbix....
Transparent compression layer on Linux?
My use-case: streaming video to a Linux virtual mount and want compression of said video files on the fly....
RAID Card temperature
Hello everyone!...
[Physics] Does gravity have 'elasticity'? If a solid sun-sized object zooms across space at the speed of light, then abruptly stops, does it take gravity some time to 'settle' around it?
Is it a stable/static effect no matter what, or is it a bit more stretchy/bouncy depending on how the object is behaving?...
Amazon plans to give Alexa an AI overhaul — and a monthly subscription price (www.cnbc.com)
The first crew launch of Boeing’s Starliner capsule is on hold indefinitely (arstechnica.com)
Trump lashes out after DOJ reveals classified documents were found in his bedroom (www.independent.co.uk)
what if the hacker provided the public key for https connection? (www.youtube.com)
So this video explains how https works. What I don’t get is what if a hacker in the middle pretended to be the server and provided me with the box and the public key. wouldn’t he be able to decrypt the message with his private key? I’m not a tech expert, but just curious and trying to learn.