

Ehh. Old 8-bit machines had no trouble with the veritable Gordian knots written by kids in their bedrooms back in the day, so any chip’s gonna be fine.
That’s not to say this chip wouldn’t run it better…
Some middle-aged guy on the Internet. Seen a lot of it, occasionally regurgitating it, trying to be amusing and informative.
Lurked Digg until v4. Commented on Reddit (same username) until it went full Musk.
Was on kbin.social (dying/dead) and kbin.run (mysteriously vanished). Now here on fedia.io.
Really hoping he hasn’t brought the jinx with him.
Other Adjectives: Neurodivergent; Nerd; Broken; British; Ally; Leftish
Ehh. Old 8-bit machines had no trouble with the veritable Gordian knots written by kids in their bedrooms back in the day, so any chip’s gonna be fine.
That’s not to say this chip wouldn’t run it better…
FTA:
Fedora’s announcement [of Fedora 42] contains plentiful references to Douglas Adams’ Hitchhiker’s Guide to the Galaxy
If you broaden your question only slightly from bamboo to bamboo and its close relatives, then it has taken over the world. It’s in the grass family, and in no small part thanks to humans, it’s literally everywhere.
Then you need concrete. And lots of it.
“Mooom, he’s on my side of the car! He’s touching me! Make him stop!”
“I’m not touching you! You’re on my side of the car! You’re touching me! Mom, it’s all his fault.”
Try preceding the hash with a backslash. Not all of the Fediverse supports all of the same parts of Markdown when viewing posts between instances, but that one ought to be reasonably standard.
# If you see this line preceded by a hash, that’s because it actually starts with \#.
The cynic in me wants to know: Once purchased, will it, and any media it might contain at any time, be under the sole control of the purchaser?
If not, it’s definitely not worth buying.
In addition to corsicanguppy’s comment, some — often important — programs actually expect the system to be secured in a particular way and will refuse to function if things don’t look right.
Now, you’d be right to expect that closing down permissions too tightly could break a system, but people have actually broken their systems by setting permissions too openly on the wrong things as well.
That said, for general, everyday use, those commands don’t need to be used much, and there might even be a way to do what they do from your chosen GUI. Even so, it nice to know they’re there and what they do for those rare occasions when they might be needed.