![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
I forgot about Bitcoin when it was still mostly worthless. I got rid of my old laptop when it had a ton of issues. I had around 8 btc left in a wallet after spending several hundred on um… An ancient trade route lol.
I forgot about Bitcoin when it was still mostly worthless. I got rid of my old laptop when it had a ton of issues. I had around 8 btc left in a wallet after spending several hundred on um… An ancient trade route lol.
Found the incel
For now, they still provide DRM free downloads in FLAC. And they still pay the artists on the Fridays. I’ll continue using it till they inevitably fuck it up.
I wish list stuff until a Bandcamp Friday comes around where artists get all the money. I’ve stopped buying physical media, so waiting on a digital purchase isn’t an issue for me.
The other key feature being cost. A VDI terminal is much cheaper than actual PCs for employees. When I was working IT for a large company, we were able to get them in bulk for about $100 each. A PC cost us at least $800.
I used to buy FIFA and NHL games, once every few years. But they’ve gotten so shitty I just gave up on them. I haven’t played a soccer game in years now. PES used to be a good alternative but I’ve heard it’s not great anymore either.
Bandcamp has been great but I fear the enshittification coming. Half the staff was fired by Epic Games last year and then it was sold to a music conglomerate.
So someone didn’t read the documentation and didn’t understand that site is used in many contexts? How is this DataDog’s fault? Blame your shitty process instead of shifting it to save face.
Yes, a VPN with strong authentication is what you want.
Yeah the best hope is that upnp is turned on. I think that’s the protocol that allows automatic port forwarding to happen
How is PiHole not built for custom DNS? It literally has an entire management page for that.
I’d guess that it’s running under a different user. You can find the user executing it and provide the key to that user via copying it to their ssh directory, or by using an identity file option for your command.
Although now that I think of it, I’d create a separate key and provide that public key to keep it separate from your user account.
So the error is because a service is already running on port 80 (http). This could be nginx or apache depending on configuration. Nginx is very useful if you plan to run more than one service in the container. And it’s more trusted security wise than I would trust Lemmy right now tbh. I would maybe configure Lemmy to run on a different port locally, and setup an nginx site to proxy to port 80.
It’s been a while since I’ve messed with devops stuff though, so I may be misremembering a bit.
I’m not sure how you got that from my comment.
Drive encryption doesn’t really matter to malware, since the disk must be decrypted to function when turned on. Also the majority of malware still runs in userland, maybe arguably more since the rise of ransomware.
I’m not sure what you mean by permissions being limited to the Microsoft store exactly, but there’s a very robust permissions system built into Windows by default. It’s just not very user friendly, and your average user wouldn’t know it exists probably.
There’s arguments on both sides about default security policies anyway, as I’ve found navigating osx systems to install software can often be a nightmare - but that could be due to my lack of experience with it directly.
Both systems have pros and cons from a security standpoint. In the corporate spaces I’ve worked in, osx security is more annoying to manage from a central point than Windows.
The thing is that Windows is still more used than osx. So naturally it’s going to be targeted more. Especially since more businesses use Windows than osx too.
I’ve come across Linux malware in my time in cyber Sec. If it exists, it’ll have malware.
Yeah makes it easier to identify new stuff. Like I recently added a new NAS into my network, and I didn’t have to try and figure out which device it was identified as. Just sitting at 200.1 so I could give it a name and assign a static IP.
I live alone. So I just have reserved IPs for each of my devices. Any new device gets assigned >200 so that I can easily identify new stuff, or rogue devices - which hasn’t happened lol. The only special IP is my pihole that gets 192.168.1.2 next to my router since I consider it infrastructure basically. Plus pihole is my dhcp server and dns obviously
I’m sure I’ve committed many code crimes. But the one that should send someone to jail that I’ve personally seen was when I found an eval in production code that was actively being exploited. Put up a PR to fix it and was given a very hush hush meeting that it was there intentionally to fix production data issues secretly because the bureaucracy made it hard to do lol. I just kept my mouth shut and eventually used it once myself.
Yeah it sat in my wallet for a long time and wasn’t really gaining any value. I didn’t have a need for the trade route anymore cuz I just used it once for some exotic spices that I didn’t really care for. Mining wasn’t an option for me because I didn’t have a powerful computer as a broke college kid. So I just kinda checked out.
Still sucks to think about how I could have ended up with a great return, but hindsight is 20/20 and all that.