I agree with you. The other people in this thread are quick to judge and could stand to learn from some of the wisdom in the shows about which they have such strong feelings.
I agree with you. The other people in this thread are quick to judge and could stand to learn from some of the wisdom in the shows about which they have such strong feelings.
I like rsnapshot, run from a cron job at various useful intervals. backups are hardlinked and rotated so that eventually the disk usage reaches a very slowly growing steady state.
in case you didn’t know: it’s relatively easy to write, in just a few lines, a little program to produce the OTP codes on a computer instead of a phone app.
computers can do most of the checking/ordering/sending via websites, and if you live outside of a city those phone-connected infrastructure things don’t exist.
primary difference between a computer and a phone in this regard is that old comouters can perfectly well run modern Linux. with a phone, you’re lucky to have root at all so good luck updating it yourself.
DEET works… but it’s worth mentioning that it will utterly destroy the polycarbonate lenses used for modern eyeglasses
is it counting android as linux?
if so, it shouldn’t be, imo. android is deployed and used differently than Linux and is not really the same in spirit. if you can’t have root, I’d not count it as Linux for the purposes of something like this.
UDP hole punching could be regarded as a clever “hack”
it’s amazing that you’ve been downvoted for saying you pay for a service you use that’s not ad-riddled junk. how else do people expect these entities to make money that pays for servers, employees, etc.? someone operates the hardware and it’s not free.
a literal child may not have the capacity to learn from the interaction, yet. maybe other people reading it will, though.
Funtoo is a bit of both. It’s not as current as Gentoo but the tradeoff is not having to rebuild the toolchain every few weeks.
that’s not necessarily what it means. some things legitimately are easier to explain in person. ever try working out a complicated mathematical argument in an email? one can do it, but it’s not pretty. in person you can write on paper, draw figures, etc., synchronously with your compatriot observing and even participating. it’s not merely a change of medium from text to sound.
I don’t read formality in these either, fwiw. in fact they’re generally pretty casual.
ultimately, you will need some kind of access to something with at least one port open, if you intend to host services on the clearnet. you could use tor if onion services will work for you. if you have ssh access somewhere with a port open (or a friendly sysadmin), you could tunnel to there and redirect incoming connections back through the tunnel. same thing with a VPN, if the sysadmin is really friendly.
but quantum stuff can tunnel through the cheese, despite its inability to be penetrated
I do as you, and run my own services for everything I use frequently except for email. keeping it all behind a vpn prevents unwanted access. I pay for protonmail but operate my own mail server for internal use. I have machinery to download messages from protonmail upon receipt and make them available to me, and to send through protonmail. so I’m doing both and using protonmail as the interface with outside servers.
picking a different port that isn’t also used by another common service will eliminate most of the botscans you’ll see otherwise.
… do you have a reason to belive your ISP cares if you run wireguard?
… in case you don’t know: if it’s for resources on a private home network, you can easily add the CA cert (i.e. the public key associated with the private key used to sign your certs) to your devices so that it’s no longer unknown and the warnings disappear. I know this doesn’t answer your question, but it’s what I’d do instead of using letsencrypt for private services.
federation happens over the clearnet, so the only place tor gets used is your connection to the instance.
lol, EV was special. It was also pretty easy to mod with plug-ins using macos resource fork hackery, even to a kid, and all of the original game data was replaceable just by creating something with the same ID in a plug-in. Cap’n Hector became an angry invincible shuttlecraft with a single laser cannon. now that I’m old enough to afford a license, the company is gone and there’s no way, so I guess I’m stuck with him like this forever.