Upside: not fired.
Downside: have to do work.
Upside: make money
Downside: not enough money
Upside: not fired.
Downside: have to do work.
Upside: make money
Downside: not enough money
Xcom: 99% chance to hit
Also Xcom: miss.
Make sure you get a reputable VPN to avoid issues with any “questionably acquired” content.
This is why Starfleet officers use the double hand punch.
What if I say all trek is both NuTrek and OldTrek because accidental time travel
Process sugar (diabeetus)
If you have docker containers and other stuff all on that USB drive I’d really reccomend getting it all off that USB (not just logging) and onto a proper drive of some kind. USB thumb sticks are not reliable long term storage, you will wake up to find the drive failing one day and good chance you lose everything on it with little to no warning.
My guess is log files are being written to it? Might want to install a proper drive internally and redirect log storage. With less activity the USB drive should not heat up anywhere near as much.
That is suprisingly good quality. I have never really seen a still shot from laserdisc before, can see why it had a following back in the day.
Nothing too special, just had to do some fiddling to get the Apache reverse proxy working correctly. Now I believe they have a pre-made example for it, but back then they only had nginx. I stick with Apache because that’s still what I know. Might start learning nginx, but my main work isn’t in web stuff.
Mine is nice and quick in regards to the web interface and general functions. However I run it on a server at home and my upload speed isn’t the best, so if I need to pull a larger file (Files On Demand enabled) then obviously the transfer speed of the file is a bit sluggish.
Hosted on a VM with 16GB RAM, 4 cores. Using the NextcloudAIO docker deployment option, all behind an Apache reverse proxy (I have a bunch of other services on another VM that all have reverse proxy access in place as well).
In very basic terms, and why you want to do them:
Attack surface is the ports and services you are exposing to the internet. Keep this as small as possible to reduce the ways your setup can be attacked.
Network topology is the layout of your home network. Do you have multiple vlans/subnets, firewalls that restrict traffic between internal networks, a DMZ is probably a simple enough approach that is available on some home grade routers. This is so if your server gets breached it minimises the amount of damage that can be done to other devices in the network.
Next headline “Gen Z chooses to let all their choices be made by Choosing to not have enough money!”
Sisko - chance to also perform a warcrime while returning the trolley.
No stairs, only ladders, Jeffreys tubes and turbo shafts (you better turbo climb through or you get turned into turbo jam).
If you’re in the far future though, you get the whole TARDIS interior of the turbo shaft network
Good old https://windows95tips.com/
Always good for a creepy “laugh”
This would be delicious if Tesla and Muskarat caused a wave of unionisation.
For most networks, a proxy would be best done though dhcp option 252, which allows specifying a URL that contains a wpad configuration file, or through DNS.
However that’s less annoucement and more making the service discoverable.
Because even if this was implemented, rich assholes will find ways around it.
That house? Oh it’s owned by an LLC that rents it from the company I own for $1a month, I then house sit as a second job for $1 a month.
That car? Same deal.
My internet, home phone, electricity, water, insurance and all other home expenses? Paid for by my company as part of WFH rules for executives.
I also have regular business meetings in Hawaii and other overseas locations for business purposes.