• 0 Posts
  • 9 Comments
Joined 5 months ago
cake
Cake day: June 22nd, 2024

help-circle

  • Well, conflict is, pretty much, the backbone of any story, narrative, or motive. Has been for long.

    Still, I’m not sure it’s all that relevant and necessary for a video game, I agree. Some of them just let me do things I can’t in real life, like building my stupid base on different planets and moons, or transforming the landscape for the sake of it.



  • I think it’s worth advocating for quitting shitty games, though.

    Out of many friends I’ve had who (used to) frequent games like PUBG, Dota 2, League of Legends, Valorant, Overwatch, etc., most were just having a bad time, all the time. Granted, some of these work on Linux, but the point is, those of my friends that still play Overwatch (“2”, lol) just seem to be happier and more functional when they have to quit for some period of time.

    I’ve been having a much better time with my life once I went for the good old enjoyment rather than chasing rank or wins or skill, finally making time to play amazing single-player titles again or just screwing around in online games.

    And curiously enough, the online games I actually want to play and have fun doing so are the ones that work on Linux, while the rest thankfully refuses!




  • Not sure what lists you’re talking about, but it’s nerding time anyway.

    The backslash (the \ symbol) is used to “escape” characters in the software world, i.e. tell the software to treat the following character as a simple symbol, not some instruction. It’s very well-known among developers, so if they happen to be the ones writing guides on Markdown (the syntax where you use asterisks and some other symbols to dictate the final layout while having the luxury of being able to edit the document in a plain-text editor), it can actually elude them because it’s mundane.

    In fact, some software won’t allow you to use the backslash in short text fields such as names or passwords because doing so could potentially open up security risks where the malicious actors “inject” some instructions into software to cause all sorts of trouble. On the other hand, this is probably a redundant old measure, as there are usually other means to prevent this kind of attack today, but that’s the power of habit, I guess; and, well, if it’s a simple measure that works, there’s not much reason to get rid of it, is there?