Probably helps add a certain gravitas.
Probably helps add a certain gravitas.
Hidden and Dangerous
The original was fantastic and v2 built on that. Fantastic 3rd person WW2 tactical shooter. Haven’t seen anything like it in over 20 years since.
Been running Ubuntu LTS releases on all my server VMs for 8 years and haven’t had a single problem. Absolutely solid as a rock. Fantastic support, loads of guides to do anything. Plus you can get 10years of support as a home user with a free Ubuntu Pro subscription.
I’d honestly just go Ubuntu server LTS and learn to configure it through the terminal. It’s not too difficult to setup. NFS and Samba shares.
If more than 0.1% of people do that I’d be flabbergasted
“Leaked”.
All leaks are deliberately orchestrated to fan the hype train.
Attackers need to access the system kernel to exploit the Sinkclose vulnerability, so the system would have to already be compromised. The hack itself is a sophisticated vector that is usually only used by state-sponsored hackers, so most casual users should take that into account.
So it’s a vulnerability that requires you to.already have been compromised. Hardly seems like news.
I can understand AMD only patching server chips that by definition will be under greater threat. On the other hand it’s probably not worth the bad publicity not to fix more.
I moved from an FX8350 to a R5 5600G a few years ago, having run it for about 9 years. Initially I didn’t think I’d notice much difference, but frankly it’s an entirely different ballgame.
“Already stable enough”
A big reason for owning a gun is protection of property. No one owns FOSS, so you can’t shoot anyone, and that’s no fun at all.
It started with Emby and pihole. I’m now up to about 30 different services from Vault, email, 3CX, home assistant, firefox, podgrab etc.
I just setup netboot.xyz this evening as an experiment. Is pretty cool.
Yes you can do that. I do with opnsense. The username and passwd are not obvious though - they’re probably not what you use to login to the ISP portal with.
Most ISPs will have a brief FAQ on how to use third party equipment with the basics of what settings are important for your connection. You just need to enter them in to pfsense correctly. Also, sometimes searching for “<ISP_name> pfsense” can find useful blogs and articles.
It’d be nice if email clients automatically checked for public keys for any email you enter in the To fields. With a nice prompt that keys have been found to Encrypt the message with. It doesnt sound too difficult and it could lead to much wider adoption of secure emails.
Unfortunately most people get their email free because companies like reading it and stopping that means it might become a paid for service. Something I’m happy to pay for, but many wouldn’t be.
You can download the public key from the web interface. I then imported it in to gpg with a gpg --import public.asc
and then used the above commands to generate the WKD structure.
No worries, I thought it was pretty interesting and I’d never heard of it before so thought I’d share.
The most difficult part for me was configuring nginx to properly serve the files. The gpg part was actually the easy bit.
There’s 2 methods, one uses a subdomain and one doesn’t. Without is called ‘direct’. No special DNS entries required really. I have a wildcard subdomain entry which works for me. Just so long as the key is available over HTTPS using one method.
I’ve been using it for a few years. Really handy way if avoiding cooperate firewall rules.
How’d you set that up with Opnsense fail over? I have an opnsense VM with input straight from the ISPs FTTP box to the NIC on my server. So I can’t fail over to my second proxmox box without swapping the cable over.
Q
Quake Quake II
But maybe U
Unreal Tournament 2004