

When was the last time you saw a headline: “Thieves steal home lab”?
When was the last time you saw a headline: “Thieves steal home lab”?
The encoding format of URLs is URL encoding, also known as percent-encoding. Content in the URL may be first encoding in some other format, like JSON or base64, and then encoded additionally using percent-encoding.
While there is a standard way to decode percent-encoding, websites are free to use base64 or JSON in URLs however they wish, so there’s not a one-size-fits-all way to decode them all. For example, the “/” character is valid in both percent-encoding and base64-encoding, so to know if it’s part of a base64-encoded blob or not, you might end up trying decoding several parts of the URL as base64 and checking if the result looks like URL-- essentially brute force.
A smarter way to do this might be to maintain a mapping between your favorite sites that you want to decode and what methods they use to encode links. Then a tool could efficiently directly decode the URLs embedded in these click trackers.
Lol. After professionally hosting email for 15 years I’m happy to let someone else handle it now.
About 90% of incoming mail will be spam and it will be your job to make sure you are doing good job of classifying it so you don’t get junk in your inbox and don’t lose real mail in the spam folder.
Then for outgoing mail you need to make sure SPF, DKIM and DMARC are all in order.
Then there is all the usual stuff of security updates, backups, monitoring, alerting, logging and having a plan for internet outages.
Yes, it’s all doable but I won’t expect it be “set and forget”. I expect there will be quite a bit of tuning with some possible spam and delivery problems while you get kinks worked out.
I also use Ansible. Using Podman’s “quadlet” adapter, the containers run as systemd services.
I set up a second dedicated cat cam for some meetings, pointed at the calming presence of a cat sleeping on my desk.
Congrats on the cat box cleaning!
There’s also Zitadel: https://zitadel.com/
The Big Beautiful Bill also bundled a bunch of unrelated things, and that still got GOP votes.
The mode only seems to trigger if the midplate is pressing a switch on the MB. If you are running the MB without the midplate it doesn’t seem to trigger, so the server car should be supported.
Also, all spam messages.
I’m sure Tesla shareholders are happy to hear he’s picked up another side project.
One obstacle all third parties face in the US is party-line voting, which favors the dominant parties.
On possible outcome is that he puts a lot of money into making third party candidates more viable, like efforts to ban party-line voting or supporting ranked choice voting. So, you could vote for the America Party candidate and then if they don’t have a majority ñ, you vote could roll over to the Dem or GOP candidate of your choice, reducing your risk of voting third party.
These changes would help Libertarian, Green and other parties as well. More choice for voters!
I host routing for customers across the US, so yes I need it all. There are ways to solve the problem with less memory but the point is that some problems really do require a huge amount of memory because of data scale and performance requirements.
Nope. Some algorithms are fastest when a whole data set is held into memory. You could design it to page data in from disk as needed, but it would be slower.
OpenTripPlanner as an example will hold the entire road network of the US in memory for example for fast driving directions, and it uses the amount of RAM in that ballpark.
As long you give them a good life before you murder them and eat them, that changes everything.
The same way that pigs are food and dogs are not. Cognitive dissonance.
Simple means different things to different people.
I self-host Ghost and find it pleasant to use and low maintenance. It is a single Docker container plus MySQL. I recommend a reverse proxy in front of it like Nginx. There are importers from many other blog formats.
Snorting tea, coffee and broccoli would be less popular too.
I haven’t heard of that happening much outside of law enforcement raid.
Laptops, yeah. But stories of homes being broken into to steal servers?