There’s no alternative for 0.0.0.0 and a firewall if you’re e.g. using kubernetes.
There’s no alternative for 0.0.0.0 and a firewall if you’re e.g. using kubernetes.
That assumes you’re on some VPS with a hardware firewall in front.
Often enough you’re on a dedicated server that’s directly exposed to the internet, with those iptables rules being the only thing standing between your services and the internet.
Considering that reading source code can take a long time
You’ll get faster over time, until reading code is faster than reading documentation, as code will always represent what’s truly happening, while docs are frequently outdated.
In a language the user isn’t familiar with
If you’re not that familiar with the language, it’s likely you won’t be contributing to the project. Open source projects usually to have quite limited resources, so they tend to optimize docs and dev UX for people who are likely to contribute.
With that, the Germans will have finally won /s
Just go ahead with the tutorial. Kotlin is basically identical to Java with only tiny changes, and you can just look those up whenever you see something new.
Cloudflare actually had to disable them because someone managed to automate them with AI too.
Sure, it’d be a solution for five minutes until someone delids the secure enclave on the gaming card, extracts the keys, and builds their own open source hw alternative.
High-performance FPGAs are actually relatively cheap if you take apart broken elgato/bmd capture cards, just a pain in the butt to reball and solder them. But possibly the cheapest way to be able to emulate any chip you could want.
Element has the same costs as Signal. So far, Element has been lucky in being able to raise money by selling support contracts to governments or companies using Matrix, but even that isn’t enough, which is why Element has been raising money for the Matrix Foundation for almost a year now (with little success).
If you’ve got 14 billion years, a theft takes a minute, then you need 53 recursion levels of binary search to find the moment of the theft. (14 billion years can be split into about 7.3e15 1-minute segments, 53 levels of binary search allow you to search through 9e15 segments)
That means OP assumed that it’d take 1 minute to decide whether at a certain still frame the theft had already occured or not, to compute the new offset to seek to, and the time it’d take to actually seek the tape to that point.
Not an unreasonable assumption, but a very conservative estimate. Assuming the footage is on an HDD and you’ve got an automated system for binary search, I’d actually assume it’d take 5 seconds for each step, meaning finding a 1min theft on 14 billion years of footage would take 5 minutes.
Even if it’s blocked for the average user, it’d still be awesome if we could circumvent it with adb. I’ve used KDE Connect to access my phone remotely for a long time, and now that feature is useless.
He also uses his own http server that in turn queries the ldap server solely for the articles. The rest is compiled into the http server binary.
“just works” if you’ve got the fps set to 60 on an M1/M2 macbook and update the OS, you’ve bricked it.
Better laptops tend to put the wifi antenna in the display, so it’s far away from the USB ports when in use. Obviously that’s not compatible with ultra thin laptops.
Badly shielded USB3 causes RF leaks at 2.4GHz. use 5Ghz WiFi or better shielded devices.
Tbh, Garak is just: Kingsman, but make it star trek.
Often enough, the old code is so badly intertwined that it’s impossible to actually test. Those are the moments where all you can do is nuke it from orbit.
There’s no provider that’s going to be more safe than Hetzner, tbh.
If a provider doesn’t comply, you’ll just get special services raiding their DCs instead.
And if you switch to a VPS provider, you’re even more exposed.
Set up CAA with proper restrictions, enforce CT for your clients and use proper full disk encryption to prevent them from placing implants on your server itself.
You need to be able to have multiple nodes in one LAN access ports on each others’ containers without exposing those to the world and without using additional firewalls in front of the nodes.
That’s why kubernetes ended up removing docker support and instead recommends podman or using containerd natively.