It looks like a whole mastodon instance full of such people. Front page trending tag is ‘fakenews’.
Some dingbat that occasionally builds neat stuff without breaking others. The person running this public-but-not-promoted instance because reasons.
It looks like a whole mastodon instance full of such people. Front page trending tag is ‘fakenews’.
FFS, 7 month old account with 0 comments or posts as it shows to me and a meme about how the parasite class need to be taxed/removed sends you off in a tizzy. You have to build some history before jumping in whole hog to be a believable troll you know?
What the centrist so reviled here dislikes is being told we’re no better than fascists for taking a small or piecemeal win rather than stomping our feet and going home if we don’t get a full Marxist revolution today.
If they’re already giving exclusive access to Google for search and AI training, my bet is it’s all in a bid for ‘please buy us daddy Google’, and let them handle it from there.
It’d be a replay of RBG all over again “we can’t confirm a new justice now, the people need to vote first”.
That’s my go to for my quick scratch pad notes, generally something I only need for a one time deal.
I use the Bit Warden secure note feature for more permanent things.
If it is a more ongoing documentation deal that needs organization I like Bookstack.
All depends on the purpose one uses it for.
Unless it’s something like a ‘unpopular opinion’ community it’s better not to go into places, particularly ones like behaw who tend to be extra cautious about negative commentary, and say X sucks. All that does is beg for a fight and is bound to irritate someone if it becomes a habit.
After all, they wouldn’t want anyone to call them out on continuing chicanery during such a trivial event as their home country’s presidential election cycle…
Who is surprised here, raise your object manipulation attachment, er, hand…
Yet I see those same posts screen-shot and posted here as though they was reliable news sources.
I have to wonder, how hard would it actually be to set up one of these ‘luxury’ brand names with 1000% markups and use it to Robin Hood the crap out of a bunch of people with too much money. Pay for the local school renovation via profits off some of those people too high on their own farts to notice those around them.
What’s the odds that these things don’t become regular theft targets, even of the drones themselves? Porch pirates are enough of a thing now, can’t see any of them feeling bad about robbing a robot.
https://emby.media/community/index.php?/topic/23648-tutorial-rar-playback-with-emby/
I’ve used this kind of setup, not the cleanest and doesn’t actually move/remove the rars but let’s a media player import the contents directly from inside them. Doesn’t make any notable impact on performance that I’ve seen.
I looked about for it and the PG update basically involves creating a new folder to initialize and then exporting/importing the old DB, but haven’t successfully done so yet here.
They’re a part of the mix. Firewalls, Proxies, WAF (often built into a proxy), IPS, AV, and whatever intelligence systems one may like work together to do their tasks. Visibility of traffic is important as well as the management burden being low enough. I used to have to manually log into several boxes on a regular basis to update software, certs, and configs, now a majority of that is automated and I just get an email to schedule a restart if needed.
A reverse proxy can be a lot more than just host based routing though. Take something like a Bluecoat or F5 and look at the options on it. Now you might say it’s not a proxy then because it does X/Y/Z but at the heart of things creating that bridged intercept for the traffic is still the core functionality.
It depends on what your level of confidence and paranoia is. Things on the Internet get scanned constantly, I actually get routine reports from one of them that I noticed in the logs and hit them up via an associated website. Just take it as an expected that someone out there is going to try and see if admin/password gets into some login screen if it’s facing the web.
For the most part, so long as you keep things updated and use reputable and maintained software for your system the larger risk is going to come from someone clicking a link in the wrong email than from someone haxxoring in from the public internet.
I have a dozen services running on a myriad of ports. My reverse proxy setup allows me to map hostnames to those services and expose only 80/443 to the web, plus the fact that an entity needs to know a hostname now instead of just an exposed port. IPS signatures can help identify abstract hostname scans and the proxy can be configured to permit only designated sources. Reverse proxies also commonly get used to allow for SSL offloading to permit clear text observation of traffic between the proxy and the backing host. Plenty of other use cases for them out there too, don’t think of it as some one trick off/on access gateway tool
Eat beaver and thine sin shall be forgiven, pretty sure that’s what she said…
Zabbix or Cacti are nice ways to draw maps that also serve a functional role in keeping track of the activity and alerting.
Looks like was just updated today pending transfer, so either the owner transferring registrars or someone took it over.
Oh come on, you think some would do that? Go in the internet and tell lies?
I mean it is or at least should be a policy on most sites already, it’ll be nice to have some teeth beyond banning their accounts though.