How does the search work?
How does the search work?
I can’t come up with just one and this list changes over time a lot for me. But here is a current top 3 for me
Dry the River - Weights and Measures
“Currents” is pretty good if you like metalcore!
It’s a security thing. The HttpOnly cookie can’t be stolen using XSS or something like that, while a bearer token must be stored somewhere where javascript can see it.
Where my Java/Kotlin frameworks at?
And then there is the “clipboard” (copy paste function) in the nano text editor being a third
Yeah the credit card works well. I’m not really using the rest of the crypto functionality it offers 😅
Yeah the credit card works well. I’m not really using the rest of the crypto functionality it offers 😅
The crypto.com app. I mean maybe the reason is “security”, but it takes like 10-20 seconds to view my credit card details.
In that case, I’ll think I’ll just stay on the NewPipe/SmartTube/Revanced/adblock route for now
Is that trick “safe” for your Google account? I wouldn’t mind paying for yt premium, but it’s really not worth 7€ a month to me. Maximum half of that.
I tend to wear Ecco’s (not crazy expensive ones, more in the 120-150€ range). I quite like them in terms of being strong and looking good enough. But I think they last me about 2-3 years.
Brandon Sanderson is always a good recommendation
I do see the other way around as well. So the games don’t get updated and then don’t support newer versions of Android. I see the same with RCT Classic.
Well the judges are currently reviewing the evidence, so at best, the proof is not public yet. Suffice to say the prosecutors claim he appeared to be running a sex trafficking ring (https://www.reuters.com/world/romania-detains-ex-kickboxer-andrew-tate-human-trafficking-case-2022-12-30/). Which very often contains countless cases of rape.
He also “proudly” says he’s a misogynist, woman are weak, etc (https://www.bbc.com/news/uk-64125045). This its not something non-rapists tend to say.
I agree for serious/business applications. In my case, it’s a home server that I and some close friends and family access. But it is indeed exposed (basically, my router routes port 80 and 443 to the server within the NAT).
To discuss the header-based firewall: the host is used by Traefik to determine which docker container to route (reverse proxy) the traffic to. So I don’t see any obvious ways an attacker can really manipulate that to reach (in my case) the bitwarden instance. My main attack angle this protects if is there is some vulnerability in Bitwarden and bots are going around exploiting that. That way at least Traefik would already block them before they get to bitwarden.
But yes another service with a vulnerability could be exploited, then escape that docker container and you’re in the whole server.
Something to keep in mind here. I am also using an IP white-list, but only on some services Traefik hosts.
So for example bitwarden is behind an IP white-list, but subsonic is reachable from any IP.
I think in that case it’s not really possible (or doable) to write L2 firewall routes.
But if you want all traffic to port 80 on your server to be IP whitelisted, then a regular firewall would be good.
Then the next question is, when was it last updated?
Well AR15 sales are good for business, and piracy is not… Great world!