Make sure you get a reputable VPN to avoid issues with any “questionably acquired” content.
Make sure you get a reputable VPN to avoid issues with any “questionably acquired” content.
Given you can normally answer headline questions with a “no”, I’m going to guess no.
But what they do have is a stupid amount of existing money, so they can gamble on anything they like the look of, and occasionally get lucky.
One of the most famous examples of them guessing wrong is on ring doorbell cameras.
No, this means the recovery key or other external unlocks have been lost, but the TPM chip is still working correctly to provide the bitlocker key during boot.
This is not bypassing bitlocker, simply bypassing loading the bsod causing crowdstrile driver by booting into safe mode. You still need a valid administrator account so authentication is also not compromised.
You would still need some kind of exploit to bypass the windows login screen.
Biometrics, also people are horrible at making good passwords/pin codes. There’s also normally a few tricks to get around being locked out for X minutes/days/years. Also you can bet Apple or whoever made his phone bent over backwards to help the FBI get in to that phone. The idiot tried to shoot a former president of the United States.
Process sugar (diabeetus)
If you have docker containers and other stuff all on that USB drive I’d really reccomend getting it all off that USB (not just logging) and onto a proper drive of some kind. USB thumb sticks are not reliable long term storage, you will wake up to find the drive failing one day and good chance you lose everything on it with little to no warning.
My guess is log files are being written to it? Might want to install a proper drive internally and redirect log storage. With less activity the USB drive should not heat up anywhere near as much.
It does not whip the llamas ass.
Enjoy the time as furniture as much as you can. Or family cat passed last year, I miss that the most
CHANGE HIM!
FEED HIM!
SWADDLE HIM!
CHANGE HIM AGAIN!
AND AGAIN!
HOW DOES SUCH A SMALL BEING MAKE SO MUCH POOP?!
They, or someone they know, most likely sitting on gb’s of the stuff.
Given the abstract nature of a lot of the economy these days (which unsurprisingly benefits those with wealth) it’s debatable if it fits to be honest. I would lean more towards yes. They would argue that by exposing bad conditions, helping people lower the cost, causing a rental to go empty, or whatever else means they aren’t getting the money they feel entitled to.
The same kind of arguments are often used when corporations argue that piracy is stealing. All that has happened is an unauthorised copy of a movie/etc had been created. Yet that is called stealing and they try and fine people sometimes thousands more than what a legal copy would cost.
Nothing too special, just had to do some fiddling to get the Apache reverse proxy working correctly. Now I believe they have a pre-made example for it, but back then they only had nginx. I stick with Apache because that’s still what I know. Might start learning nginx, but my main work isn’t in web stuff.
Mine is nice and quick in regards to the web interface and general functions. However I run it on a server at home and my upload speed isn’t the best, so if I need to pull a larger file (Files On Demand enabled) then obviously the transfer speed of the file is a bit sluggish.
Hosted on a VM with 16GB RAM, 4 cores. Using the NextcloudAIO docker deployment option, all behind an Apache reverse proxy (I have a bunch of other services on another VM that all have reverse proxy access in place as well).
In very basic terms, and why you want to do them:
Attack surface is the ports and services you are exposing to the internet. Keep this as small as possible to reduce the ways your setup can be attacked.
Network topology is the layout of your home network. Do you have multiple vlans/subnets, firewalls that restrict traffic between internal networks, a DMZ is probably a simple enough approach that is available on some home grade routers. This is so if your server gets breached it minimises the amount of damage that can be done to other devices in the network.
Next headline “Gen Z chooses to let all their choices be made by Choosing to not have enough money!”
Red pill. I have so many new ideas on how to ruin my life!
Who wants to bet one of the arguments he wanted to use was "Twitter doesn’t exist anymore, I run a platform called X, therefore well don’t need to honour any Twitter contracts "
Oh fun.
And disabling Bluetooth on phones isn’t really a viable option these days because so many people use Bluetooth headphones because of the removal of headphone jacks/the convenience of Bluetooth earphones.
Thankfully the devices I look after are mainly iOS, windows, and macos, so patches should be available in due time.
People with old Android devices are going to be left out in the cold sadly. Thankfully my Samsung s21 is still in support.
Yep, companies give “unlimited PTO” because it’s a way to actually reduce the amount of PTO employees take.
Give them 20 days PTO/year? They’ll take around 20 a year.
Give them unlimited PTO? They need to justify every bit of PTO, so probably only get to take 4 or 5 for important days.