Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)M
Posts
55
Comments
164
Joined
3 yr. ago

  • It seems like this is the only solution. I'll give it a go.

  • Tor only works with Snowflake bridges and the speed is very low.

  • Yes I can SSH to my US vps. I'll give this a try thank you.

  • No they are blocked at protocol level no matter which port you use.

  • This is the case unfortunately. They are blocked at protocol level.

  • On the contrary, I right mouse click the archive in my filemanager Dolphin and use the Extract > Extract here menu entry. This will extract the files and the sub directories have new last modified dates, but not the files. This does not need any manual folder creation by you.

    Are you sure? I just tried this and the extracted folder is not on top.

  • Does it support video calls?

  • Fedora and intel iris graphics.

  • Very good points. Call me paranoid but i always fear I might fail to notice the symptoms of something nasty going on. I wish linux had a built-in, easy-to-use auditing/alerting system. I know this can be achived by experts but others have no idea what's actually going on on their machines.

  • There are several known instaces of crypto exchages getting hacked.

  • My ssh auth logs show a lot of login attempts from chinese IPs. That prompted me to install Fail2Ban..

  • I think you can use Tailscale Funnels for that.

  • Donno why i was downvoted. I've been an avid KDE fan for years.

  • GNOME is grared toward dev people who need something almost as minimal as a wm. KDE is better suited for average users.

  • It matters since a top 3 distro will identify with KDE Plasma desktop. This is not very common.

  • My laptop has Intel Core i7-1165G7.