fnafdesktopfan111

joined 10 months ago
[–] fnafdesktopfan111@lemmy.blahaj.zone 2 points 2 months ago (1 children)

That kind of looks like how a machine would look if the RAM is loose in the socket or otherwise have a bad contact. And since you mention that it's random and sometimes there are no vertical lines, that'd be my guess rather than anything to do with graphical software. Is the RAM on your machine soldered on or is it detachable? If it's the latter, I recommend taking the RAM out and reseating it to see if things improve (try this a couple of times, just to be sure the RAM is properly seated). If the RAM is soldered on then it might have something to do with out of memory. Does the system slow down a couple of seconds before freezing entirely? If it does then it's likely it's a OOM thing.

Oh, and for good measure, can you get to the tty (ctrl + alt + f2) when the system freezes? If you can then it's probably a graphical thing and you can try restarting those processes. If the system is in a complete freeze then I'd say that's another point for the OOM hypothesis.

me if i was Tails, or "The Amnesic Incognito Live System", a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity against surveillance, which connects to the Internet exclusively through the anonymity network Tor and is designed to be booted as a live DVD or live USB and never writes to the hard drive or SSD, leaving no digital footprint on the machine unless explicitly told to do so.

The Warrior's bland acronym, MMI, obscures the true horror of this monstrosity. Its inventors promise a new era of genius, but meanwhile unscrupulous power brokers use its forcible installation to violate the sanctity of unwilling human minds. They are creating their own private army of demons.

Greenway suggests that the Wobblies stumbled upon this modus operandi as a means of combating the street bands of the Salvation Army and the Volunteers of America, who frequently would drown out Wobbly speakers in a "cacophony of cornets and tamborines." One enterprising IWW organizer, wishing to combat the forces of obscurantist "pie in the sky" theology, "retired long enough to organize a brass band of his own.

Denisoff, R. S. (1970). The Religious Roots of the American Song of Persuasion. Western Folklore, 29(3), 175. doi:10.2307/1498356

Crawl OST by Alex Yoder. All his other stuff is pretty good as well, but this one is my absolute favorite. Too bad he doesn't release stuff very often.

[–] fnafdesktopfan111@lemmy.blahaj.zone 4 points 10 months ago (1 children)

my deepest condolences... also don't they re-open public registration on Nov 20? https://shitposter.club/notice/Aa34W1BLFyy3RuBB5M

[–] fnafdesktopfan111@lemmy.blahaj.zone 8 points 10 months ago (3 children)

i don't want to sound mean here, but the whole point of an invite system is that only relatively trusted people can get in. giving invites away to anyone asking for it would mostly defeat the point.

There are numerous ways to deal with it, depending on the specific application and use-case. For some, there's an open-source alternative that, while not 100% similar in every aspect imaginable, does offer basically the same functionality (LibreOffice for MS Office Suite, Thunderbird for various email clients, Firefox or just Chromium for Google Chrome). For others, you can use an emulator (WINE, for example). For games specifically, Steam offers an emulator that works for most games (Proton); in fact, all the games I've tried worked. Then, there's the very last option, which is using a virtual Windows machine within Linux. I mention it last because I honestly haven't found many cases where I absolutely needed to do this, and because the set-up is rather "involved", shall we say. But if you're using Adobe Suite stuff then, yeah, you basically got no choice there.

Would you mind listing some of the essential programs that you use so we can get a better idea what your workflow is?

[–] fnafdesktopfan111@lemmy.blahaj.zone 2 points 10 months ago (1 children)

basically an agreement between 14 countries to share signals intelligence amongst one another. effectively, if your data gets captured in Sweden, all the participating states are able to get their hands on it. check out the Wikipedia article for more details on 14 eyes: https://en.wikipedia.org/wiki/Five_Eyes#Fourteen_Eyes

[–] fnafdesktopfan111@lemmy.blahaj.zone 3 points 10 months ago (3 children)

not to discredit what they do and what's been said, but i think it's important to keep in mind (with one's threat model in mind also) that they're based in Sweden, a 14 eyes country.