I hereby claim:
- I am roge on github.
- I am knob (https://keybase.io/knob) on keybase.
- I have a public key whose fingerprint is 1A85 BB8E BE7F E321 BC9B 8864 36B2 D60D 74C6 F22F
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
An excerpt from "The Brain Makers" by HP Newquist (pg. 196):
Before long, Symbolics officials claimed that Stallman was actually taking the code that they were giving back to the lab, and that he was forwarding it to Greenblatt. Symbolics hackers even monitored Stallman's activities by using a little known feature that enabled networked LISP machines to watch what other LISP machines were doing. In essence, a hacker on LISP machine A could literally watch the screen activities of LISP machine B. After a few of these spying sessions, it became clear to Symbolics that Stallman was forwarding LISP code to LMI.
Several Symbolics executives approached MIT's administration and presented their evidence. Do something about Stallman, Symbolics' executives demanded. In order to keep its relationship with Symbolics on an even keel, MIT warned Stallman to stay away from the various LISP projects, but stopped short of denying him access to the lab's computing facilities. One more infraction, however, and Stallman m
const NT_TIMER_ENTITY_TARGET_NAME = "NT_TimerEnt"; | |
const NT_SCRIPT_VERSION = "1.0.4-beta"; | |
NT_LastGrenade <- null; | |
NT_LastRestoredGrenade <- null; | |
NT_SavedGrenadePosition <- null; | |
NT_SavedGrenadeVelocity <- null; | |
NT_AwaitingSave <- false; | |
NT_IsPaused <- false; |
This is a list of teams that are usable with the mp_teamlogo_1
and mp_teamlogo_2
convars in Counter-Strike: Global Offensive. You must use the team's short name as the value for the convars to ensure that the logos will appear correctly.
Last Updated: March 9, 2015.
Team Name | Short Name | Logo (64x64) |
---|---|---|
3DMAX | 3dm | |
Astana Dragons | ad | |
Bravado Gaming | bravg | |
Cloud9 | c9 |
A list of reasonably reliable DNS servers that I've personally tested to ensure that they fully support DNSSEC and do not hijack NXDOMAIN responses.
Address | Organization | Location | Service |
---|---|---|---|
8.8.8.8 | Worldwide (Anycast) | Google Public DNS | |
8.8.4.4 | Worldwide (Anycast) | Google Public DNS |