I can see it going both ways. Talking about execution times, this would be an exaggeration, but then, these memes always are.
I can see it going both ways. Talking about execution times, this would be an exaggeration, but then, these memes always are.
Here’s something I don’t understand: Why don’t they just make the drone target the jammer when it’s jammed? That’s pretty much the only signal that’s clear as day in these conditions, and when it’s done, there’s one less jammer…
To be fair, speed is relative.
Sure, but the relevant speed up there is relative to the air around you. The missile will have a negative air speed at first, than accelerate to positive, briefly passing through 0 in between, which comes with weird consequences for lift and steering.
I mean, that is exactly what has happened…
MacOS is basically a different world.
In a language that has exceptions, there is no good reason to return bool here…
Sure, whatever works for you… so long as it’s not this jet.
Anyone got a non-paywalled version?
Also, almost all of that is written in C, which is a successor to B, which is a simplified version of the Basic Combined Programming Language. There was never an A.
In all seriousness, digging tunnels is a military tactic that gets some use sometimes. The Russians have done it in the southern part of Avdiivka. I haven’t heard of a case where militaries used an actual tunnel boring machine, though.
Tunnel boring machines are not just extremely expensive, they’re also extremely bulky and highly visible when on top of the ground. If you ship one to where you want to start your tunnel, there is a high risk that enemy intel will spot it, ruining the surprise.
The actual digging is extremely slow, meaning there is no way of knowing whether the tunnel will even still have some tactical use when you’re done.
Once you emerge on the other side, it won’t be long until the enemy notices your exit and does something about it, like bombarding it, stationing troops there or sending something of their own back through the tunnel. That means even if you succeed, you only have a very short window to do something with your tactical advantage, and said something will very likely be a suicide mission.
Tunneling through the loose mud of Ukraine would not be easy. You can do it if you send a work crew after the machine to immediately build strong walls behind it, but that would be even slower and more expensive.
All in all, it would just be more useful to use either much smaller and shorter tunnels that don’t use tunnel boring machines or utilize some form of artillery or drones to achieve the desired effect behind enemy lines.
Well passwordless.
Same thing in this context. But sure, an encrypted partition would work.
Dunno about ideal, but it should work.
It does have quite a bit of overhead, meaning it’s not the fastest out there, but as long as it’s fast enough to serve the media you need, that shouldn’t matter.
Also, you need to either mount it manually on the command line whenever you need it or be comfortable with leaving your SSH private key in your media server unencrypted. Since you are already concerned with needing to encrypt file share access even in the local network, the latter might not be a good option to you.
The good part about it is, as long as you can ssh from your media server to your NAS, this should just work with no additional setup needed.
Interesting. Though it does seem to to require your private key to be unencrypted…
Is sshfs an option? Unfortunately, I don’t think you can put that into /etc/fstab, though…
Those reasons would apply to any air based anti-ground operations, even perfectly normal bomber or attacker planes.
Wait, they managed to forge Let’s Encrypt certificates? While it explains the attack on TLS (though technically not https as originally claimed, not that it makes much of a difference), that’s even worse…
Really? That’s a rather big claim, and would change a lot for me if true. Do you have anything by the way of a source?
Also, how do you MITM https traffic without one of the parties just handing you their keys?
In your case, instead of getting a dedicated server and putting proxmox on it, I would check if it might not be cheaper to just get individual virtual servers directly.
Other than that, sure, I have been a customer for many years now, and I have always been a fan of Hetzner’s price to quality ratio.
Those aren’t files, though, they are just some sectors on your block device. Sure, if you mess with those, your ability to decrypt your disk goes out the window, but then, when was bypassing the filesystem and messing with bits on your disk directly ever safe?
It’s possible he was using an encrypted key file instead of just a password for that extra strong security. In that case, of course, if you lose that file, kiss your data good bye.
Is the “Fire Storm” Emblem on the front of the car on the billboard making the whole thing look AI generated, or am I getting paranoid? Or maybe both?