I just recently ran a bunch of cables in the house. Lots of work, but yes definitely worth it.
I just recently ran a bunch of cables in the house. Lots of work, but yes definitely worth it.
You’re on social media right now.
Non-electric refrigerator? Like an old fashion ice box? How do you like using it?
The sound of rain on a tent mixed with a crackling fire, very relaxing.
I’ve been using plex for a while and it works great.
Right, but that content will still exist server side.
Solid idea. One consequence of this would be the possible delay in removing material that really should be removed as fast as possible, though.
What worked for me was starting out slow, but making sure being consistent was my priority. I forced myself to go on short walks at least 3x a week and stuck to it. It kind of grew on its own from there.
Mint is my go to suggestion for new people switching over.
This is why I love lemmy. Bookmarked! Thank you.
That is terrifyingly true. Wired cameras all the way.
When someone couldn’t understand why I got my tooth pulled instead of getting a root canal. (It’s way cheaper to get it pulled here.)
You’re agreeing with something I didn’t state. I’m not defending the idea of introducing bugs through bad code and then blaming others. I think the way Linus responded to that was the issue.
I don’t think I am missing the forest. There’s not an issue with the idea of correcting a developer, but there is an issue in the way the correction was carried out. Just because something behaves “better” after punishment doesn’t mean the punishment was good. Ends justifying means and all.
“An oldie but a goodie”… What?! This shouldn’t be celebrated. What an absolutely unacceptable way to behave. Shame on anyone encouraging this.
If your interview involves telling me a username is “something you are” rather than “something you know”, I’m running away from that job as fast as I can.
#2 is a dangerous assumption!
This came from your security team? I usually see it from HR / management selling it as a branding issue or “professional” thing.
Gosh I get unreasonably frustrated when someone says yeah but that’s just security through obscurity. Like yeah, we all know what nmap is, a persistent threat will just look at all 65535 and figure out where ssh is listening… But if you change your threat model and talk about bots? Logs are much cleaner and moving ports gets rid of a lot of traffic. Obviously so does enabling keys only.
Also does anyone still port knock these days?