Because proprietary binary logs are tamper proof, while I one could easily manipulate a regular text file.
Danielsan
You're...
Announcement
Collapse
No announcement yet.
Search Result
Collapse
100 results in 0.2679 seconds.
Keywords
Members
Tags
-
It's a slippery slope. It might start with him, next you know people get banned for simply having unpopular opinions while being factually correct....
- Likes 2
Leave a comment:
-
Unless a user is openly hostile and threatens other members, what's the point in doing either?...
- Likes 1
Leave a comment:
-
I didn't appreciate him spreading completely untrue metrics (like his infamous rant about how 4G is inherently secure, users can't be tracked -- even...
- Likes 1
Leave a comment:
-
I haven't tried it myself, yet (I think the most I ever did was end one or two commit messages with random animal faces. Just for the giggles).
...
Leave a comment:
-
https://gitmoji.carloscuesta.me/
Some of my acquaintances at Google and Microsoft actually practice that....
Leave a comment:
-
Not to ruin that nerdy joke, but GCC isn't the standard compiler backend for Go. GC is, which is not in any way related to GCC or GNU....
- Likes 2
Leave a comment:
-
Maglev? You mean the tech the Chinese stole from European (particularly German) companies? If Europeans weren't such greedy cucks, China would've failed...
- Likes 4
Leave a comment:
-
It's far more complicated than that.
There's actually a 9P server rooting the requests to the Linux filesystem.
You can't simply manipulate...
- Likes 1
Leave a comment:
-
Bottom Ad
Collapse
Leave a comment: