If the function is known by all parties then the last person to send still has control
If the function is known by all parties then the last person to send still has control
I was suggesting to do neither and run the container directly. Putting k8s on top of lxc is still completely stupid. Just run k8s bare metal to operate your containers.
Run docker within lxc within proxmox. This gave me an aneurism. You’ve lost the whole point of not actually virtualizing with containers by putting in two layers deep in virtualization. At this point your shit is so convoluted why don’t you just run kubernetes
The unfortunate reality is that these communities are big enough now that advertisers are aware of them. They are full of sock puppets and have become guerrilla advertising platforms and you have to really read through them more carefully than in the past
VPN is inherently not zero trust. You really should be moving to ZTN based tools
Seconding the other comment, lots of orgs picked .lan and then over the last few years have moved things into the cloud and .lan has become a meaningless soup since half the shit isn’t even on local network. Now it just means “needs a vpn or ztn to talk to”
Luckily my last three orgs finally bought a second domain for private dns. It’s quickly becoming a pattern that myorg.com owns myorg.tech or whatever for private traffic. Domains are cheap as fuck compared to everything else a business spends money on, it’s really silly how many people are using hacks for this
As much as I think commercial real estate is minimally linked to the rest of the economy, it’s been well established that you can’t just convert office buildings to apartments.
Floor plates aren’t cut to manage the changes to the floor plans in some cases not even being designed to carry the weight as modern office buildings often utilize floating plates so adding more walls actually would cause all kinds of issues with the walls as the building wobbles around. The plumbing doesn’t have the capacity and also is centralized in the buildings despite apartments each needing it, requiring more alterations to the floor plate. The windows requirements for bedrooms leaves most of the central space of the building unusable or everyone has kitchens and living rooms with no windows…. It’s often cheaper to demolish the building and start over than it would be to modify it.
To get a real idea of this look at apartment buildings in manhattan. They are either long and skinny towers or they are the size of a block, but have a massive quartyard running down the middle where office buildings are solid all the way through.
Except ironically Netflix has announced they will not make an app for the Vision Pro
When we wrote malware in labs in college one of the first places we looked was unemptied trash. This is almost certainly a pattern that’s going to leave your crap in trash in plaintext and even the dumbest script kiddie will find it the very first time you slip and something gets in your system.
Ghetto fork it. GitHub will nuke the forks done via the fork button with the initial DMCA
deleted by creator
deleted by creator
That one is not anonymous at all and it’s super easy to extract the “real” email for advertising and spam purposes if you wish to do so
The body of the watch was also gold, not just the band.
This market is getting saturated fast. Apple TV, Fire TV both pair directly to at least one first class streaming service as they are developed by the same company. Chromecast is still hanging on. Plex offers streaming content now as part of Plex pass. Cable tv boxes can now also do native streaming to select services. Major TV brands are dropping the Roku OS to roll their own shitty android port.
I personally moved to the Apple TV because it’s the only one probably not selling my data and isn’t constantly griping at me with some kind of upsell like the Roku and Fire Tv
Hashing is not reversible so obviously it is not hashed. You hash data you want to compare later to see if it is still the same. For example you may hash user passwords you store in your database. So you don’t know the actual password, but can confirm later that the same password is still being used. You know or can infer someone is storing your passwords in plaintext when they have a maximum length as that indicates they are not correctly hashing.
It is however possible and even easy in many databases to do row or document level encryption. Many privacy first applications do client side keys and encryption so the database does in fact have no plain text in it.
This actually isn’t true. You can configure sonarr and radarr to directly search indexers without using a wrapper. Most people use a wrapper so you only need to configure changes to your indexers from one place instead of updating sonarr,radarr,lidarr,readarr all individually
Still, at the end of the day a large part of what you get is what you have access too. Better indexers gets you more content
I had a landlord make me pay them in zelle. Bank limits meant I had to pay them over 3 days every month. What a mess