

Is this a lost karma bot?
Is this a lost karma bot?
A less intrusive solution would be to just put your sensitive data in LUKS and configure services that use that data to depend on the partition being mounted. That doesn’t require modifying the normal system startup process. You’re less likely to mess up your startup process at the expense of needing to be more mindful about where you’re putting your files.
Tang and Clevis have already been mentioned as a way for one server to boot using another server.
You can also create an environment where the server boots into a phase 1 where it obtains network connectivity and then waits for you to provide it the key to continue booting. The first phase is unencrypted, so don’t put sensitive data in there.
I’m less hopeful. People would just switch to the formatting tab and use that. Most people center text on a title page by repeatedly hitting the enter key to go down and then the space key to go right and then they get to the next page by pressing the enter key until they get to the first line of the next page like they’re using a typewritter.
It is bad practice because of point 2 and if you have multiple replicas you can probably get different versions running simultaneously (never tried it). Get Rennovate. It creates PRs to increment the version number and it tries to give you the release notes right in the PR.
In Markdown and HTML and TeX and even Microsoft Word you’re supposed to just use the Heading 1 style option instead of manually changing the style of the paragraph text. There are times when you don’t want to use Word, most commonly because you’re managing your documents as text files in a source code management system or because you’re an LLM and you’re incapable of anything besides Unicode text, and it has some limitations that make it unsuitable for typesetting, but it’s not bad for word processing, and the file types aren’t that terrible to work with anymore. People just don’t know how to use it.
deleted by creator
Borg / k8s / Docker are not the same thing. Borg is the predecessor of k8s, a serious tool for running production software. Docker is the predecessor of Podman. They all use containers, but Borg / k8s manage complete software deployments (usually featuring processes running in containers) while Docker / Podman only run containers. Docker / Podman are better for development or small temporary deployments. Docker is a company that has moved features from their free software into paid software. Podman is run by RedHat.
There are a lot of publicly available container images out there, and most of them are poorly constructed, obsolete, unreprodicible, unverifiable, vulnerable software, uploaded by some random stranger who at one point wanted to host something.
VLANs are lower than IP so you don’t need a router to have a VLAN, but you will need a router to get packets between the networks. I don’t think a WiFi repeater works. You likely need separate WiFi client and AP devices so you can put your WiFi on a different channel. Otherwise you’re probably halving your WiFi performance when connecting to the other network over the same airwaves.
Unless you can convince the other network to route your IP addresses, this setup will give you another layer of NAT and may cause problems with online games.
Trying hundreds or thousands of hashes against the servers of random unconsenting people on the internet is beyond what I would be comfortable with. People have been prosecuted for less. It’s not the same as a crawler where you try a few well known locations and follow links. You’re trying to gain access to a system that somebody did not intend for you to have access to.
These endpoints probably don’t have protection because they were never designed to and it’s hard to add it later. Theoretically, if the IDs are random that’s probably good enough except that you wouldn’t be able to revoke access once somebody had it. The IDs probably aren’t random because at some point only the path is used. It’s how software evolves. It’s not on purpose that somebody may be able to guess the ID to gain access to it.
This article is very confused. America definitely isn’t banning TikTok because it’s unpopular or unimportant. American billionaires are stealing TikTok because it is more profitable than their apps.
I think in this case whether it’s distribution or not would have to go to court. It’s not intentended to be distribution. Depending on the judge and the lawyers it could be distribution or not distribution or the prosecution may have committed a crime in finding it.
That is possible, but I don’t think you need to worry about that. Having a copy of a movie is not normally itself a crime.
If the server is using a standard path prefix and a standard file layout and is using standard file names it isn’t that difficult to find the location of a media file and then from there it would be easier to find bore files, assuming the paths are consistent.
But even for low entropy strings, long strings are difficult to brute force, and rainbow tables are useless for this use case.
It’s not that challenging if you are looking for specific media files, but if you wanted to enumerate the files on a server it’s basically impossible.
If the ID is the MD5 of the path, rainbow tables are completely useless. You don’t have the hash. You need to derive the hash by guessing the path to an existing file, for each file.
Just like last time?
But he’s too stupid for that. He wants so badly to be king when the problems catch up that he would destroy the country to do it. He had a years long tantrum after he lost the election.
The ones on Amazon are intended to run GPUs for crypto farms, but they’re all brands you’ve never heard of with dubious claims and they’ve all got at least one review where either the device was defective or something was installed incorrectly and it caused damages.
I did this but buying these on Amazon is scary. Try to find one that won’t burn your house down.
That’s part of it. The other part is that Google, and other search engines, assume you’re clueless and try to “fix” your query for you, and you can’t stop it because they’ve been removing support for searching exact words or using boolean expressions or excluding words.