Keep this quiet, but VPN to UK and sign up for channel 4. They have commercials, but UK does much funnier commercials than across the pond.
Keep this quiet, but VPN to UK and sign up for channel 4. They have commercials, but UK does much funnier commercials than across the pond.
I used awk to migrate users from one system to another. I created template scripts for setting up the user in the new system, I dumped the data from the old system, then used awk to process the dump and create scripts for each user in the new system. That was a fun project.
When you have battery life beyond 5s next year you’ll be thankful
Yeah, I’m sorry to say that is a result of good marketing. I work at a university and we have experience with a good number of XPS laptops.
We saw at least a 60% problem rate, and Dell’s support was dog slow. Batteries being the weak spot. Because it’s thin it is more fragile, we saw a number of broken screens, and keyboards. One survived a Gatorade spill, but another failed after a water spill. Go figure
A three year warranty helped, but we were out of a laptop for months at a time, more than once on the same laptop.
Ultra thin laptops look cool, but suck in almost every other way. If you need thin then get a MacBook Air.
Match blocks allow you to restrict who/what is allowed or not allowed to connect to the server. There is a large number of options to utilize. Put this near the bottom of sshd_config. There should be an example there.
Here are some more examples: https://stackoverflow.com/questions/10829712/sshd-with-multiple-match-sections-override-settings
Yes that’s the right way to block root login. An added filter you can use the ‘match’ config expression to filter logins even further.
If you’re on the open network, your connection will be heavily hit with login attempts. That is normal. But using another service like Fail2Ban will stop repeated hits to your host.
Ssh listens on port 22, as soon as a connection is made the host moves the connection to another port to free up 22 for other new connections.
Btw: I wasn’t thinking clearly here. Out going connections won’t be using port 22, but the listening incoming port is always 22.
This is the way.
AKA don’t be this guy.
Don’t trust executables on your computer. A Windows VM in a Linux host that you revert to a prior snapshot of you’re really curious.
The XPS line was popular at work. Desk candy to compete with Mac books. However the engineering did not complete at all. The battery was the biggest fail point, we had a high percentage of battery issues under warranty, and they would take months to get replaced by the vendor.
We stopped buying them, if someone wants desk candy these days it’s mostly Mac book pro as expensive as your budget can handle.
Uhm? No.
Russia and China-backed hackers are exploiting WinRAR zero-day bug https://techcrunch.com/2023/10/18/russia-sandworm-fancy-bear-china-winrar-zero-day/?guccounter=1
Great graphic, this needs to be a t-shirt
Also, I’m not sure if IA’s purpose is to get a around a pay wall. That might be considered violating copywrite.
The internet is forever… https://archive.ph/kmhqs
Currently, 3kg (6.6lb) [of carrots cost] 15 riyals ($4.12). We can sell 3kg [of 3D-printed carrots] for 10 riyals ($2.75), only for carrots
Because, (Waves hands) 3d printed carrots. Molds are to costly, and take to much time to use.
Like the old timey chicken nuggets with brown meat.
This seems similar to an ssh session, but ssh has great authentication and authorization parameters that can be setup. Whereas code.exe is left open.
So why is this getting down voted. Seems like a valid concern.
Nice move there AI. I see what you’re doing.
The US vs them sentiment shouldn’t exist when it comes to science. Rather, congratulate them and produce a better machine.
China has just as many paradoxes as the US, the good be the bad mentality only fosters the air of war.
Hackers, if you can hear me, hack the smart TVs to block Fox and Sinclair
Like a Bosch!