Oh come on, you think some would do that? Go in the internet and tell lies?
I mean it is or at least should be a policy on most sites already, it’ll be nice to have some teeth beyond banning their accounts though.
Some dingbat that occasionally builds neat stuff without breaking others. The person running this public-but-not-promoted instance because reasons.
Oh come on, you think some would do that? Go in the internet and tell lies?
I mean it is or at least should be a policy on most sites already, it’ll be nice to have some teeth beyond banning their accounts though.
“We are working very hard to bring the post apocalyptic world of Terminator to life”
– Nacon The world at large
If they’re already giving exclusive access to Google for search and AI training, my bet is it’s all in a bid for ‘please buy us daddy Google’, and let them handle it from there.
Sounds like no GOG then? If they’re doing DRM free that would seem a natural fit.
That’s my go to for my quick scratch pad notes, generally something I only need for a one time deal.
I use the Bit Warden secure note feature for more permanent things.
If it is a more ongoing documentation deal that needs organization I like Bookstack.
All depends on the purpose one uses it for.
After all, they wouldn’t want anyone to call them out on continuing chicanery during such a trivial event as their home country’s presidential election cycle…
Who is surprised here, raise your object manipulation attachment, er, hand…
Yet I see those same posts screen-shot and posted here as though they was reliable news sources.
I have to wonder, how hard would it actually be to set up one of these ‘luxury’ brand names with 1000% markups and use it to Robin Hood the crap out of a bunch of people with too much money. Pay for the local school renovation via profits off some of those people too high on their own farts to notice those around them.
Never used don’t care really but:
users can also force touch a post in order to open a menu with more options.
Their terminology needs some work, force touching is not ok…
Question here, why do the cameras I need to only connect to that one? Using an extender won’t create a truly separate net, some might create a NAT to look separate but you can still connect from the extenders net to the host net.
WiFi continually beacons out to try and find previously connected networks and will select for the best signal from an AP it can reach. Extenders can be a trick if you’re sitting in the ‘crossover’ space between the extender and the back haul it connects to.
What you might try instead is one of those distributed AP systems like Unifi or similar where all the APs are controlled by a switch and work in unison. The one I have at least has an ability to disconnect someone if they drop below a certain level and migrate them to another AP without breaking the session states.
The other option that I can think of is just turning off the auto connect for the extender net and only using that manually.
Dutch museum colonialism is a context for an art photo sale?
Other than it costing ~$4,000 for a print of an old photo which is kinda how art tends to work, I’m not seeing the problem here?
The hard part is securing the exported tokens in a way that you could quickly replace them in the event a device was lost/compromised. A good practice would be something like with Aegis you can have it save an encrypted export whenever you make a change and then sync that to an external location where you can re-import it from. Wiping them from the original lost device is another challenge in itself, but as I recall both Android and Apple have mechanisms where you can send a signal to remotely wipe the system.
Then a new theory emerges, the lost filling pie earth, in which the creator was actually in the midst of forming the planet, got distracted and threw the shell in the oven without the contents.
This has the added benefit of explaining global warming and it conveniently fits over the shell of a giant turtle.
And with a major portion of US military aid grants coming with the condition that the purchased equipment come from US contractors you can argue which funding bucket it came from, but in all practicality Israel bought US systems with aid money granted from the US and then where willing to give the old systems they intended to decommission to someone the US is aiming to support.
It really is just US aid to Ukraine with an Israeli sticker on it in that sense.
Israel wants to get some gold star for agreeing to send systems the US provided to Ukraine now? What kind of PR lunacy is going on here.
They’re a part of the mix. Firewalls, Proxies, WAF (often built into a proxy), IPS, AV, and whatever intelligence systems one may like work together to do their tasks. Visibility of traffic is important as well as the management burden being low enough. I used to have to manually log into several boxes on a regular basis to update software, certs, and configs, now a majority of that is automated and I just get an email to schedule a restart if needed.
A reverse proxy can be a lot more than just host based routing though. Take something like a Bluecoat or F5 and look at the options on it. Now you might say it’s not a proxy then because it does X/Y/Z but at the heart of things creating that bridged intercept for the traffic is still the core functionality.
It depends on what your level of confidence and paranoia is. Things on the Internet get scanned constantly, I actually get routine reports from one of them that I noticed in the logs and hit them up via an associated website. Just take it as an expected that someone out there is going to try and see if admin/password gets into some login screen if it’s facing the web.
For the most part, so long as you keep things updated and use reputable and maintained software for your system the larger risk is going to come from someone clicking a link in the wrong email than from someone haxxoring in from the public internet.
For those willing to do a bit of CLI work there are even tools to pull your whole library automagically. Just make sure you got the space for it. Sitting at just over 1.5 TB here.
https://github.com/Sude-/lgogdownloader