.bak gang rise up.
.bak gang rise up.
Plasma isn't a KDE OS, but Neon is.
This article describes the contents of a few kits, but it's pretty typical emergency stuff. A first aid kit, whistle, flashlight, some calories dense foods, maybe a Google-branded water bottle.
Often, if an rss link isn't on the page, there's still a feed available. /rss and /feed are the most common places to find it.
I'd be interested in utilization data before and after that change. Anecdotally, I use Signal much less after SMS was removed. With one app, I could opportunistically use Signal, when the other person had it, and send an SMS otherwise. Now I have to decide what kind of message to send before opening an app and learning my options. Most of those quick messages have moved back to SMS for me.
Most self-hosters are probably using dns services through their registrar, but you don't have to. A registrar with poor api support might still be a good choice, if that was the only negative.
Well, I'm back and can confirm the sneaky DNS resolver. I have two roku devices and they both were making requests to 8.8.8.8.
Thanks for this post! TIL.
Interesting. I set an adblocking dns via DHCP and, as far as I know, the Roku respects it. Ads are blocked and I can see it failing to delivery telemetry in my dns logs (most persistent thing on the network).
I set a rule to catch outside dns to see if anything, the roku included, has been misbehaving.
DNS blocking (Pihole, adaware, nextdns…) Can take care of those ads on dedicated streaming boxes.
And boy are my arms tired.
It’s from Morrowind, released 2002.
We did a “bring your dog to work day” at my workplace and this is pretty much how it went. By noon, all the dog-bringers had taken their pets home.
I Nerevar would have guessed.
Yeah, there was only one issue on the ballot which contained all of these changes. That issue was defeated.
They’ve certainly become a lot more…
Nope, not gonna do it.
There are many ways to setups full disk encryption on Linux, but the most common all involve LUKS. Providing a password at mount (during boot, for a root partition or perhaps later for a “data” volume) is a but more secure and more frequently done, but you can also use things like smart cards (like a Yubikey) or a keyfile (basically a file as the password rather than typed in) to decrypt.
So, to actually answer your question, if you dont want to type passwords and are okay with the security implementations of storing the key with/near the system, putting a keyfile on removable storage that normally stays plugged in but can be removed to secure your disks is a common compromise. Here’s an approachable article about it.
Search terms: “luks”, " keyfile", “evil maid”