They say they’re holding steady, and they are, look at those graphs.
They didn’t say they were holding steady at ideal levels.
Infrastructure nerd, gamer, and Lemmy.ca maintainer
They say they’re holding steady, and they are, look at those graphs.
They didn’t say they were holding steady at ideal levels.
Sneakers is one of the all time great hacker movies too, and the only one of the bunch that’s reasonably accurate / realistic.
Everyone is ok with Python. It’s a reasonable choice that’s well known, well understood and doesn’t have a lot of negatives. There’s a million libraries for it so it’s easy to get started and add support for new things.
I’ve never met a hobbyist developer who writes Java for fun. It lives in the enterprise world mostly, and not much else that I’ve seen.
I have no knowledge, but would guess:
deleted by creator
FWIW I did this with jellyfin and ended up just using a vm instead of lxc. This way I could just pass the entire device through, not have to mess with drivers in my proxmox host, and not have to reboot all my vms/lxc just to apply updates.
Thumbnails do, not the actual image generally.
It’s not VPN endpoints we block, it’s some ASN’s that we’ve seen excessive amounts of abusive traffic from. Primarily that’s isps in China, but I also added Zenlayer a while ago (which is the hosting provider your vpn endpoint was on).
I’ve removed them from the ban list, you should be good now. They might get readded if we see a flood of abuse from them though.
I just happened to see your comment, anyone can feel free to dm me if they have issues.
I don’t think signal data is included in system backups unless your device is rooted. You’d have to go into signal and back it up explicitly.
I just turned this feature on. I don’t backup my device all, I just expect everything to be in my cloud.
First good episode of the season IMHO.
A box running homeassistant with the appropriate zigbee / zwave dongle.
I’ve worn glasses my entire life and only once has trouble, when an optometrist was making my lenses incorrectly.
This sounds excessive, you should go get things checked.
It’s not great, it’s actually pretty ineffective.
The ceo stepped down and now its just being rolled fully into Microsoft.
https://www.axios.com/2025/08/11/github-ceo-dohmke-step-down
Solid ep, but I thought the whole phone line thing was stupid.
I like that they have fun with the show, but I wish they would do it less frequently. It feels too silly at times.
I tend to agree. I think the US might lean on ASML after that, but they could also tell the US to fuck off.
Most don’t create new keys per server machine but that’s not the issue. I don’t bother, I create a key per client machine on my side.
Server gets compromised once, admin logs in and fixes it, admin logs in next time and the backdoor compromises it again.
That’s all this is. If you can get in once, it’s a spot you can leave a backdoor that many admins will miss. That’s it.
Admins don’t generally copy that whole file around, they usually copy and paste the lines they want. Also I generally copy and paste it from my workstation, not another server.
Just give them commands, that aren’t their name. Both my cat and dog do an assortment of tricks and are very food motivated.
If your hosting is a bad actor, you’re screwed no matter what. Why bother with this when they have direct access to your disk and ram
You could turn off authorized key files, or lock them down. This isn’t really a big security risk though, there’s countless ways to backdoor a system once you have access to do this.
This just targets a remote account, not your local pc.
They stored people in quark’s holosuites in that ds9 episode