

In the US, if it was built before 1984 and you pay the ~$400 tax stamps, your dream can come true.
In the US, if it was built before 1984 and you pay the ~$400 tax stamps, your dream can come true.
Who needs to solve it, the answer is 42.
He’s a reporter, I think he has a little latitude to be away from his desk for a few minutes, even days or weeks at a time.
And they only have to win once, we have to fight and win every time they introduce a new variant. Its exhausting.
DRM: Giving people a lock, the key, and unlimited time to play around.
You can buy cans of just corn in water. Those are mostly full of corn, with water filling the space between. Creamed corn is a whole other thing, and while it has some corn kernels in it, it’s mostly meant to be eaten as-is or used as-is in a recipe. The liquid in creamed corn is not meant to be discarded.
Genuinely curious: why are you straining creamed corn? If you want corn kernels, why not buy that instead?
Based on the date, this is like reporting the second one, imo. A third wouldn’t be at all surprising though, the Serial-Killer-in-Chief won’t stop until someone forces him to.
A layered defense is always best. Nothing is 100%, but knowing your threat model will help define how far you have to go and how many layers you want in the way. Defending against State level actors looks different than swatting the constant low effort bot traffic. You’re right, if a bad actor gets root on your machine, all security is forfeit. The goal is to minimize that possibility by keeping applications and packages updated and only allowing necessary connections to the machine. You mentioned wireguard or tail scale. Set that up first. Then set up the host firewall to only allow outbound traffic onto the VPN to the required ports and endpoints on the LAN. If the VPS isn’t hosting any public facing services, disable all traffic except the VPN connection from and to the public Internet both on the cloud provider’s firewall and the host firewall. If it is hosting publicly accessible services then use tools like fail2ban and crowdsec to identify and block problem IPs.
Firewall rules on outbound traffic from the VPS to the LAN would do it. Allow traffic to the hosts and ports that the VPS needs to reach and block everything else.
That’s true, from a certain point of view. What they actually did was give everyone a common target. We still get everything compressed and limited into a flat line, just now we don’t have to adjust the volume on our stereo between songs.
To add to that, I like to say there’s no bad reason to not have kids. Any reason you can think of that you shouldn’t have a kid, that’s a great reason. There are lots of bad reasons to have kids though.
Better to keep your mouth shut and look stupid then open it and remove all doubt.
And now they’ve decided to build their own.
Agreed.Also, Windows and OSX, unless you want to have to call your nephew who’s Good With Computers™ every couple of weeks. If you’re just using a browser for everything and never messing around like a good majority of people, Linux is just as good as either of those. Linux has gotten to the point where it’s Grandma proof if you stick to a distribution that prioritizes stability. If you choose a distro that prioritizes bleeding edge software versions, you may come across more bugs and breaking changes.Then you’ll need the troubleshooting skills mentioned here. Most of us are here to learn and mess around; the troubleshooting skills grow from that mindset.
I agree with your lack of affection for cloud services, but I think your view might be a little skewed here. Does a senior mechanic need to understand the physics of piston design to be a great mechanic, or just gather years of experience fixing problems with the whole system that makes up the car?
I’m a Senior Systems engineer. I know very little about kernel programming or OS design, but i know how the packages and applications work together and where problems might arise in how they interact. Software Engineers might not know how or don’t want to spend time to set up the infrastructure to host their applications, so they rely on me to do it for them, or outsource my job to someone else’s computer.
I tell my kids, never start it, but if someone hits you, hit them back hard enough that they won’t want to do it again. I feel like this works all the way up to state level doctrine.
I feel like you’re wrong here. Moses and Joshua were pretty big into the whole genocide thing. Deuteronomy 20:16 for example is pretty clear about that, among many other examples.
Except for the weapons we sold them, the intel reports we provided, etc, etc.
I feel like this is just a step towards getting back to phones that are hard linked to a provider like we used to have. Swapping a SIM makes it too easy to switch.