As ready as they’ll ever be, which probably isn’t all that ready in absolute terms…
Some dingbat that occasionally builds neat stuff without breaking others. The person running this public-but-not-promoted instance because reasons.
As ready as they’ll ever be, which probably isn’t all that ready in absolute terms…
Frankly fo my time, best gaming series ever. With a few exceptions each one stands alone as it’s own story, but there are the ever present threads that in some cases turned into almost easter-egg items in a given game. Where are Biggs and Wedge going to show up this time? Can I get my hands on a choccobo? Hey Cid, thanks for the airship…
There are some use cases other than web page compatibility. One for me is in dealing with firewall and proxy policy, if the agent is a browser and comes in on specified explicit ports then force authentication, things of that nature.
That’s my go to for my quick scratch pad notes, generally something I only need for a one time deal.
I use the Bit Warden secure note feature for more permanent things.
If it is a more ongoing documentation deal that needs organization I like Bookstack.
All depends on the purpose one uses it for.
I have to wonder, how hard would it actually be to set up one of these ‘luxury’ brand names with 1000% markups and use it to Robin Hood the crap out of a bunch of people with too much money. Pay for the local school renovation via profits off some of those people too high on their own farts to notice those around them.
Never used don’t care really but:
users can also force touch a post in order to open a menu with more options.
Their terminology needs some work, force touching is not ok…
https://emby.media/community/index.php?/topic/23648-tutorial-rar-playback-with-emby/
I’ve used this kind of setup, not the cleanest and doesn’t actually move/remove the rars but let’s a media player import the contents directly from inside them. Doesn’t make any notable impact on performance that I’ve seen.
They’re a part of the mix. Firewalls, Proxies, WAF (often built into a proxy), IPS, AV, and whatever intelligence systems one may like work together to do their tasks. Visibility of traffic is important as well as the management burden being low enough. I used to have to manually log into several boxes on a regular basis to update software, certs, and configs, now a majority of that is automated and I just get an email to schedule a restart if needed.
A reverse proxy can be a lot more than just host based routing though. Take something like a Bluecoat or F5 and look at the options on it. Now you might say it’s not a proxy then because it does X/Y/Z but at the heart of things creating that bridged intercept for the traffic is still the core functionality.
It depends on what your level of confidence and paranoia is. Things on the Internet get scanned constantly, I actually get routine reports from one of them that I noticed in the logs and hit them up via an associated website. Just take it as an expected that someone out there is going to try and see if admin/password gets into some login screen if it’s facing the web.
For the most part, so long as you keep things updated and use reputable and maintained software for your system the larger risk is going to come from someone clicking a link in the wrong email than from someone haxxoring in from the public internet.
I have a dozen services running on a myriad of ports. My reverse proxy setup allows me to map hostnames to those services and expose only 80/443 to the web, plus the fact that an entity needs to know a hostname now instead of just an exposed port. IPS signatures can help identify abstract hostname scans and the proxy can be configured to permit only designated sources. Reverse proxies also commonly get used to allow for SSL offloading to permit clear text observation of traffic between the proxy and the backing host. Plenty of other use cases for them out there too, don’t think of it as some one trick off/on access gateway tool
Should not, wonder if there’s any adguard/pihole lists to smack OneDrive/box/Dropbox/etc domains and just take these services out before they can start.
Someone pulled that formula straight out their ass
Plugging a modem into the POTS made them smart I say.
Zabbix or Cacti are nice ways to draw maps that also serve a functional role in keeping track of the activity and alerting.
Looks like was just updated today pending transfer, so either the owner transferring registrars or someone took it over.
https://www.whois.com/whois/funkwhale.audio
Domain expired on the 19th, so it’s validly offline. Has always seemed to be a low-adoptiom platform, will have to see the status in the next few days.
Makes sense, I’m so accustomed to making virtual machines and such that it becomes just a thing but inevitably at some point admin access was required to create the hypervisor, the vnic, a virtual switch, etc. Without that restriction a piece of malware could readily exfiltrate data past a local protection by just making it’s own new pathway through on the fly or any number of other unpleasant things.
I recall using an app way back when I used to root and haxor all the mobiles that would do this. Kind of a virtualbox for the Nexus phones/tablets, but it needed root to do it. Will have to look into this, would be interesting if it can do so in user space somehow.
Edit: Damn, still needs root. Was a longshot to be able to hook into system resources without it but was hoping for some bridge function.
Exactly, the term has been pretty well claimed by people who host things like, oh say, their own Lemmy service or such.
There is a separate thunderbird app from k-9 now, so apparently not just an update. Obnoxious though that the new app lists a bunch of collected data types while k-9 doesn’t list any. Maybe just a legacy thing since K-9 has been around forever and they didn’t list them originally, but still upsetting for the privacy minded.
TB:
K-9: