A more recent example:
"Nobody needs more than 4 cores for personal use!"
A more recent example:
"Nobody needs more than 4 cores for personal use!"
My go-to is always PCManFM.
Yes the name sucks, but I've never seen another file manager with tabs, split view, customizable buttons, buttonizable nav bar, and have three different gui kits to choose from (Qt5, gtk2, gtk3). Really hard to beat all that.
I see your decryption key extraction and offer you a 5 dollar wrench.
The wrench also comes with DMA (direct mechanical assault), RDMA (remote direct mechanical assault via throwing), and DDIO (deals damage if opposing) capabilities. It's a real NSA bargain!
I'm in academia and I can report that still nobody uses those.
For your own archiving, just use Zotero.
For writing papers, use bibtex.
All those citing websites are just scams for high school/undergrad students trying to find their footing. There is no reason they should exist.
Epub is also a super easy format to script with, allowing easy parsing of webpages to ebooks.
The problem is that hardware has come a long way and is now much harder to understand.
Back in the old days you had consoles with custom MIPS processors, usually augmented with special vector ops and that was it. No out-of-order memory access, no DMA management, no GPU offloading etc.
These days, you have all of that on x86 plus branch predictors, complex cache architecture with various on-chip interconnects, etc... It's gotten so bad that most CS undergrad degrees only teach a simplified subset of actual computer architecture. How many people actually write optimized inline assembly these days? You need to be a crazy hacker to pull off what game devs in the 80-90s used to do. And crazy hackers aren't in the game industry anymore, they get paid way better working on high performance simulation software/networking/embedded programming.
Are there still old fashioned hackers that make games? Yes, but you'll want to look into the modding scene. People have been modifying the Java bytecode /MS cli for ages for compiled functions. A lot of which is extremely technically impressive (i.e. splicing a function in realtime). It's just that none of these devs who can do this wants to do this for a living with AAA titles. Instead, they're doing it as a hobby with modding instead.
Piggybacking on top of this to plug another university research project. TrackerControl scans all installed apps afterwards for tracking libraries (i.e. google ads) and DNS traffic to ad servers. You can also use it as an ad blocker to block specific DNS entries.
Never "just" steam your veggies. Do a quick stirfry in oil with garlic then use the residual steam to finish it up!
Life sure is harder for vampires these days. Not only do you have to worry about garlic and stakes, but there's also running tap water, concentrated solar energy, and Nvidia drivers going full brightness...
*Darth Sion enters the chat*
Pretty sure the NSA doesn't want the recovery key, they want the information the recovery key is protecting.