screenshot of a screenshot looks like
screenshot of a screenshot looks like
Voyager says “you are already here” when I click it lmfao
to take this a step further, imagine someone who has been exposed to these services designed to be addictive their entire (digital) life, as well as being pushed further into these services by their peers who are equally addicted and the “influencers” they look up to that are paid by these services.
it’s interesting because as he adds cabinet picks, they come with allegations, as well as allegations stacking against those already selected. must be a requirement for the job, typically i would think this would make security clearance all but impossible due to the blackmail but maybe that is what he liked about these picks. that or trump just sees those like him and gravitates towards that, since his drug and dementia addled brain can’t handle anything else.
just another tv host looking for a cabinet seat
ahh yes, the liberal DA, wait a second. republican frank wood DA, that can’t be right??? You must mean the sheriff then… but dane kirby is a republican too! But this is obviously a liberal problem, caused by the LeFt WiNg.
it looks like there is a bedrock branch, but i personally have no experience with bedrock.
see this issue for more details: https://github.com/minekube/gate/issues/11
i have used gate for my internal and external, works very well and i do exactly what you are asking and separate different versions and modpacks by name https://github.com/minekube/gate
i think with fingerprinting, it provides evidence that someone touched something, not that someone did not touch it
everything should be behind a firewall
I rip ass, threaten fart, get out of my body.
the projection is strong in this one
the questions of can they spy, and will they spy are different questions. at some US ISPs (at least the one i am at) the modems usually are only monitoring performance, ie number of packets, errored and discarded packets for troubleshooting. as far as the modem which i will assume is just a layer 2 bridge to your provider, usually not a whole lot going on there due to costs of the hardware. where the privacy violations are going to occur in the access equipment or core. this is what your modem connects to, then your traffic crosses on the way to the “greater internet” if your not using a vpn to outside of your provider, there is no way around it, they can and probably do tap into what your doing. a lot of them it may not be overly nefarious, i know my company does not sell customer data, and we generally only access it for troubleshooting and bandwidth analysis for upgrades, or as ordered by a court for law enforcement.
if you use a router from your isp almost every manufacturer is trying to sell all these different analytics and dpi that basically tells us what websites customers are visiting and how much/type of traffic to those sites, but directly from the router. same, or greater level of privacy violation as that can see local traffic on your lan, as well as watching wifi connection strength and scanning to see air quality and neighbors for “troubleshooting” or to sell access points.
it’s the attitude that one side says both sides have, but we know they (and you) already live in an invented reality anyway.
make sure it’s configured for clean shut downs before your battery runs out, auto power up on restoration, and hope it doesn’t happen. you will eventually have an outage that outlasts your batteries.
I have a large string of batteries from an old telco office, that runs my rack for 14hrs (calculated, I shut everything down around this time) and that did not last for the 2-3 day outage we had after a storm. Without a generator, you will inevitably have an outage, but if you are prepared, then you can mitigate any damage. use NUT if you need to shutdown or power multiple devices from one monitored UPS
I used to use kindles when I was growing up, as my dad and grandpa had large amazon libraries I was able to read from. It started with the keyboard kindles up to one of the touch e-ink ones and with the exception of the last one, every one of them had the screen fail.
I have since switched to a kobo clara 2e BW, using books loaded from calibre. the price point was comfortable, with more features than I expected (waterproof, bluetooth and wifi, ability to sign directly into library accounts), I was also happy with battery life, I read on planes/trains to pass the time and had a two week long trip where I was doing a lot of traveling by train and I didn’t need to charge at all.
I plug into my computer and load books manually I also have been looking towards doing something OTA for books and page sync, libre and self hosted.
This is possible, and exact directions will vary on distribution of the vm client. I personally do this but with split horizon dns and dnsmasq on a vm.
impossible to leak is where it gets tricky, and that will require an understanding of networking in your distribution. there will also be tutorials on this, but it’s very easy to mess up.
would be a good idea to test the backups on 7, and double check the release notes, they hold just about every caveats. The 7to8 upgrade was not horrible, if you have backups, you could always attempt the upgrade after taking backups, then if successful take new backups, test, then install new drives and restore. depends on how paranoid you feel.
If this was a production system, that is probably the change plan i would follow, but in production I would also be able to migrate VMs. I am not nearly as careful in the home environment.
the article does mention situations where police and military would see benefit from magazine disconnect, but obviously if the gun industry wants something, like to not install the disconnect, police and military will do whatever they can to make that happen