Wanted to reorganize my /mnt once and did an rm -r … without unmounting the network share of production.
We have backups now.
Keyoxide: aspe:keyoxide.org:KI5WYVI3WGWSIGMOKOOOGF4JAE (think PGP key but modern and easier to use)
Wanted to reorganize my /mnt once and did an rm -r … without unmounting the network share of production.
We have backups now.
Access is also a full “cms” for constructing program interfaces, ui.
I have seen fully fledged programs written in it, and it wasn’t pretty.
Dynamics sounds like it is “excel/sql with data analysis strapped on”, where access was “excel/sql with frontpage strapped on”
Interesting. How does it compare to ms Access (in the 90s I guess)?
Was about to say this.
I saw a small-time project using hashed phone numbers and emails a while ago, where assume stupidity instead of malice was a viable explanation.
In this case however, Plex is large enough and has to care about securiry enough that they either
did this on purpose to make it sound better, as a marketing move,
did not show this to their security experts,
or chose to ignore concerns by those experts and likely others (turning it into the first option basically)
There is no option where someone did not either knowingly do or provoke this.
But you could feasibly have conversion that crashes a system.
Say a log is generated and prefixes the entries by a padded unix timestamp. The field is padded to length 9, so after y2k1 the unsigned integer math specifies to prepend -1 = 232 - 1 spaces
Anything but root and hidden elements directly below root.
Most attacks on servers are on the connections. All IPs are owned by entities part of countries, so your IP is always under someones jurisdiction. The same is true for regulsr DNS entries, so the domain of that server.
For getting the data however, there also isn’t any protection in international waters. Someone would just raid you and you could do nothing about it. What good is lawlessness if you don’t have the ability to enforce your own “laws” about not having your data taken away?
You could lay low so noone bothers with that, but then you could also just lay low with regular secretive hosting.
The admin team is distributed and the infra is in europe iirc.
So no
Which distro should I pick?
@[email protected]: No
I have that exact setup working. qbittorrent (and -nox) are a lot more involved to set up with I2P, but there is some material on how and once you get it running it works quite well at this point.
I don’t use docker for it, but that should work too. For browsing I use a maintained fork of proxy switchy omega, which allows to choose a proxy profile based on the url, making it easy to pipe i2p pages into the i2pd socks port (I use I2Pd not I2P, don’t think it matters much). qbittorrent can be configured in the same way to statically use the the local (4447 on i2pd) port as a proxy to prevent any clearnet communication. In addition it needs the dedicated I2P host 127.0.0.1 and port 7656 (the sam bridge, giving deeper access to I2P).
Don’t expect to do anything on the clearnet over I2P, the exits are not good and it’s not what I2P is meant for. For that reason don’t set I2P up as something like a system proxy/vpn, instead pipe the specific programs you want using I2P into the proxy ports using their proxy settings.
To get rid of the firewalled status in the I2P daemon, you will need to forward ports. Maybe you have seen advice for servers that are not behind a firewall and nat, so that effectively have all ports “forwarded” already. The mythical dedicated IPv4 address.
In your case you need to pick the port your I2P daemon uses for host to host communication randomly, then forward both TCP and UDP for it on IPv4. Also make sure you even can forward ports, depending on region ISPs no longer hand out dedicated IPv4 even per router, so you might have to specifically ask your ISP for one (I had to). But that is all generic hosting, if you can set up a minecraft server you can make I2P have full connectivity.
Look into I2P.
It’s a network similar to TOR, but more suited for usecases like torrenting.
For anything you do on I2P, you can rest assured noone else can even in theory trace it back to you.
Go visit http://tracker2.postman.i2p for a large collection of public domain content.
The only issue is that there is also a lot of content available in german and english language which is not in the public domain, and due to the anonymous nature of I2P noone would be able to warn you of that. So take care you don’t accidentally seed the content to others, keeping it online for even more people to commit the same mistake with noone the wiser.
The blue thing (avali I believe) still has wings, so I’d say it’s merely a bit less readable.
There you go:
(https://files.explosm.net/comics/Dave/genieweek2.png?t=2161CF)
The original was seemingly taken down, but it’s archived at https://web.archive.org/web/20210305031852/https://explosm.net/comics/4584/
Edit: just saw that the link simply broke over time and leads to an incorrect page now for some reason. https://explosm.net/comics/dave-genieweek-2 is the new location.
away
Like, from you personally?
Aside from Australia or Japan, a move should improve the average ping users experience.
Most people are not from the us, and given its geographic location nowhere close to it either.
Where’s oolite?
Also I can recommend wz 2100 as an rts, I’d say it’s similar to settlers hok.
ISPs on a voluntary basis, not the nation
Neon Genesis Evangelion be like
That would be wasting their market position.
If vendors can expect say 10% of people to choose a non-windows option it would suffice for microsoft to offer a 20% discount in return for the vendor not offering such an option.
10% might actually be a bit low, there are a lot of people willing to install windows themselves and use one of the comically easy unlock methods.
*gets downvoted to oblivion*
The lemmy experience
Please tell me you do at least proofread the unit tests though.
Ps: No your garbage