The only reason I don’t use Linux all the time are video games - which are getting better, and streaming because DRM doesn’t support it and I can tell the difference between 720p and 4k. Otherwise it’s my main OS.
The only reason I don’t use Linux all the time are video games - which are getting better, and streaming because DRM doesn’t support it and I can tell the difference between 720p and 4k. Otherwise it’s my main OS.
That really sucks. I’m sorry to hear that. I have some minor issues with types of foods that I love, but they’re not nearly that serious. I can’t imagine having this reaction to gluten.
I mean… How could they not be possible symptoms of a disease that affects the entire GI tract? Maybe they’re not as common, but it would make sense that anything of that nature could cause nausea and vomiting
The author used to hang out on a forum I was part of before the book came out. I think he released it in a serial format and was really cool to interact with
Yes, a VPN with strong authentication is what you want.
That is a legal requirement. But myself and others got a settlement from Amazon after they stole our tips for years. I got a check for $790 that they kept from me. I dunno if DD ever got caught doing the same, but businesses do try to get away with this stuff.
Yeah the best hope is that upnp is turned on. I think that’s the protocol that allows automatic port forwarding to happen
Samsung.
Except my old TV would still try to load ads even though it wasn’t connected to the Internet. Made it run slow as shit. When the screen died conveniently right after the warranty period, I just switched to using a monitor to watch stuff.
Let’s see your regex pattern that covers every possible valid email address and rejects all invalid then. It’s not remotely as easy as you’re making it out to be.
Not saying this isn’t a shitty pattern, but you can’t make a claim like that.
You… You shut your whore mouth. We don’t talk about xml here
How is PiHole not built for custom DNS? It literally has an entire management page for that.
So the error is because a service is already running on port 80 (http). This could be nginx or apache depending on configuration. Nginx is very useful if you plan to run more than one service in the container. And it’s more trusted security wise than I would trust Lemmy right now tbh. I would maybe configure Lemmy to run on a different port locally, and setup an nginx site to proxy to port 80.
It’s been a while since I’ve messed with devops stuff though, so I may be misremembering a bit.
This is a NordVPN ad
Yeah makes it easier to identify new stuff. Like I recently added a new NAS into my network, and I didn’t have to try and figure out which device it was identified as. Just sitting at 200.1 so I could give it a name and assign a static IP.
I live alone. So I just have reserved IPs for each of my devices. Any new device gets assigned >200 so that I can easily identify new stuff, or rogue devices - which hasn’t happened lol. The only special IP is my pihole that gets 192.168.1.2 next to my router since I consider it infrastructure basically. Plus pihole is my dhcp server and dns obviously
I used to work for a state University medical system. I spent weeks slimming down an image, making sure it worked, and removed all unnecessary functions. Then some director wanted solitaire and I had to change the image to include the games package. Not just his computer. Oh no. In case his PC needed reimaged, we must change the entire image and deploy to everyone.
PreP is a really effective tool for now while research continues. Your chances of getting HIV while taking the medication correctly reduces your chances to a very very small percentage. Of course, nothing is perfect, but it’s been great for the gay amab community.
Yeah and even the front page recommendations are so much better than anything Spotify ever gave me. Bandcamp is how I found one of my all time favorite bands, Zeal & Ardor.
I’ve used SailPoint at two different jobs. It’s got its issues. But it’s also a really powerful system for enterprise level identity and access management when configured correctly.