When the man comes for your device, activate the corresponding sequence to disable biometrics. Legally, that makes it more cumbersome for them to steal your data.
- Press the power button five times in rapid succession.
Like a deck of Poker playing cards, trading card game's (TCG's) can be enjoyed in multiple ways, by applying different rulesets (formats).
TCG formats come in two main varieties: Constructed and Limited.
Broadly speaking, players bring preassembled decks to Constructed events, whereas in Limited formats they assemble a fresh deck from a pool of cards.
macOS relies too much on applications to manage their own startup item configuration. Over time, this leads to vestigial entries building up in startup items.
Both System Settings and launchctl stink at startup item management.
One of the key features lacking in macOS is GUI + CLI options to query startup items by the very name listed in the Login Items & Extensions pane. This overcomplicates basic cleanup operations, and makes it easier for malware to hide.
Standardize Command Line Interface (CLI) program exit code semantics similar to Web response statuses, towards an ecosystem of more intuitive, scriptable, and CI/CD friendly terminal applications.
Unlike modern REST apps, CLI program behavior has continued to vary in the extreme. Simply checking whether a child process succeeds vs. fails from the parent is often a complicated affair, involving tons of error handling logic specific to that particular child command, and all too often involving flaky stdout/stderr log parsing as well.
ComfyUI ignores traditional uses of the Ctrl+D
hotkey, namely erasing text to the right of the cursor (Emacs, macOS); and favoriting bookmarks (Windows Web browsers). Pressing Ctrl+D
in ComfyUI does neither of these things. Instead, ComfyUI instantly, irrecovably erases many settings and applies the default workflow.
For safety, this hotkey can be disabled:
Navigate to Settings
-> Keybinding
-> Comfy.LoadDefaultWorkflow
-> (Trash can delete icon).
Feeling lost?
You can verify the location of commands, and distinguish between different types of commands (executable binaries and scripts vs. shell built-in commands vs. aliases) with a variety of analysis commands.
For common UNIX, esp. POSIX compliant shells like ash, bash, dash, ksh, posh, zsh and WLS, try:
command -v <name>
type