Editing Talk:1692: Man Page
Please sign your posts with ~~~~ |
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 59: | Line 59: | ||
In the description of -b the computer (Named "Hex") from discworld uses ants not bees. | In the description of -b the computer (Named "Hex") from discworld uses ants not bees. | ||
Ref: https://en.wikipedia.org/wiki/Hex_(Discworld) [[Special:Contributions/141.101.98.125|141.101.98.125]] 09:13, 10 June 2016 (UTC)Bluewhelk | Ref: https://en.wikipedia.org/wiki/Hex_(Discworld) [[Special:Contributions/141.101.98.125|141.101.98.125]] 09:13, 10 June 2016 (UTC)Bluewhelk | ||
β | + | Hmm. Reading the wiki article further Hex uses a beehive for long term storage! My bad [[Special:Contributions/141.101.98.125|141.101.98.125]] 09:20, 10 June 2016 (UTC)Bluewhelk | |
"Or best offer" doesn't need to reference a financial offer, it may also mean that anyone offering to reuse the article with an alternative license is allowed to do so. Attack Mode and Stealth Mode seem to me to be references to computer viruses. Stealth Mode is also an option in some applications that can hide their presence when run, often because of malicious behavior, such as remote access tools, keyloggers, etc. Piping is not only used in Unix, it is also common in MS-DOS. Opposite Day has a good explanation on Wikipedia. Literal quote from Wikipedia: "Once Opposite Day is declared, statements mean the opposite of what they usually mean.". --[[Special:Contributions/162.158.222.217|162.158.222.217]] 11:17, 10 June 2016 (UTC) | "Or best offer" doesn't need to reference a financial offer, it may also mean that anyone offering to reuse the article with an alternative license is allowed to do so. Attack Mode and Stealth Mode seem to me to be references to computer viruses. Stealth Mode is also an option in some applications that can hide their presence when run, often because of malicious behavior, such as remote access tools, keyloggers, etc. Piping is not only used in Unix, it is also common in MS-DOS. Opposite Day has a good explanation on Wikipedia. Literal quote from Wikipedia: "Once Opposite Day is declared, statements mean the opposite of what they usually mean.". --[[Special:Contributions/162.158.222.217|162.158.222.217]] 11:17, 10 June 2016 (UTC) |