Any alternatives to this tool? I’ve used it a lot lately because I was testing out live OSes before installing one to the hard drive, but otherwise I don’t need it on a daily basis.
Any alternatives to this tool? I’ve used it a lot lately because I was testing out live OSes before installing one to the hard drive, but otherwise I don’t need it on a daily basis.
I’m not colorblind and I find this a PITA to read.
Don’t remember the tool, maybe someone here does, but there’s some web service out there that boasts a “no storage” approach. You provide some URI and some other value (maybe username) and it makes a password for you, but it’s always the same for a given combination. Basically it’s a purely functional generator.
Downside would be forgetting a minor detail (Did it end with a slash or not? What was the username?) or the site going down. You can achieve the same thing yourself with a hash calculator but those passwords are a bitch to type in.
tl;dr just use KeePass
Never tried Authelia or Authentik but I’ve heard good things about them. I’m sure one of them will integrate with a reverse proxy.
Spam is the new “cited facts” it seems.
As a liberal that doesn’t own or care to own guns I’m quite fine with gun safety being taught in schools (i.e. by licensed professionals, not a random teacher). Guns are an unavoidable aspect of our society for now and I’d feel better if my kids knew about the seriousness of handling a gun and how they’re not toys.
Regarding the topic at hand with YouTube I disagree with a complete ban of gun videos but all videos should come with clear disclaimers.
Agreed, OpenWRT is for something with limited resources like an OTS router.
I didn’t for the longest time but now I use Traefik for this. It can automatically add services (i.e. containers) to it’s routing list so the overhead is low and since I also run openwrt on my router I setup *. localhost to point to 127.0.0.1 so I don’t have to remember what ports I’m using for which service (e.g. jellyfin.localhost). You can also setup DNS entries using something like PiHole.
I put the sample template (https://yacht.sh/docs/Templates/Templates/) into a file named docker-compose.yml and Docker said the syntax was invalid. Are you saying I can give Yacht a compose file and it’s cool with it?
Used it for a bit but I didn’t like how you have to deploy things from templates which are basically compose files that don’t look like compose files.
This is the kind of AI stuff that really annoys me. Looking at one of the mutation examples I didn’t see anything that wouldn’t normally be tested by a typical mutation tool. You took a simple, idempotent process and you got an llm to do it slower, less accurately, and using more resources.
If you wanted to marry the two in a new and possibly useful fashion I would say use an llm to analyze the results of a standard mutation test and give guidance on what issues should be acted upon first. An off-by-one calculation could mean somebody loses a million dollars or it could mean a button is grayed out. Standard mutation tools don’t give you that context.
Other than the low chance of you being targeted I would say only expose your services through something like Wireguard. Other than the port being open attackers won’t know what it’s for. Wireguard doesn’t respond if you don’t immediately authenticate.
There’s a little overlap with things like Terraform but it’s not as bad as if they bought the companies that owned Chef or Puppet.
Can’t believe that’s gone through. They took JBoss when they bought RedHat so now it doesn’t have to compete with Websphere and when they bought HashiCorp Openshift doesn’t have to compete with Nomad. At this rate they’ll buy CyberArk and then that’s no more competition with Vault.
Ngrok
Twingate (what I use)
If OP has a thrift store nearby it’s pretty likely they can get both for under $30.
Not sure if you want to label it as a “captcha alternative”. In most cases I’m sure the captcha is used because they want a real person looking at the page (and the ads on the page). In this case it seems more like a way to keep either bots or people from doing nothing but consuming content (or hacking) without giving back something of value. Either way I really like the idea.
Other ways, in theory, I think you could do this kind of thing are torrent ratios (e.g. hosting one or moreLinux ISOs), general archiving (e.g. you get asked to return a random range of bytes from a file you’re supposed to be backing up), you run a weather station that reports temperature to the National Weather Service. You might think about a more general framework for just verifying if user X has been contributing something of value.
This. Sucks we can’t just say shit like it is but it’s just as easy to make it up. I’m not going to verify the claims myself but if OP said it was Vandelay Industries I might make the decision to not do business with them.
It’s a little late now since the accusation has already been made but it’s essentially legal to state verifiable facts without drawing conclusions from those facts. Still, doesn’t mean the company won’t come after you, just that they risk calling attention to the issue. Unfortunately I know of no remedy or repercussions for a company filing a baseless lawsuit.
IANAL BTW.
Surely AI makes them so efficient they’re free to spend more time organizing a union right? /s
Ventoy wasn’t a foolproof solution but it really did beat the hell out of using 6 different USB drives. Most USB “pen drives” don’t make labeling easy and without labeling I’m just plugging them in one by one till I find the one I want.