

need to proactively go out of your way to ensure a program is simple, minimal, and carefully constructed to avoid interactions potentially outside of a restricted security scope as a “security nightmare”.
You must fear hammers.
need to proactively go out of your way to ensure a program is simple, minimal, and carefully constructed to avoid interactions potentially outside of a restricted security scope as a “security nightmare”.
You must fear hammers.
In linux, setuid is slowly being phased out by
… brittle resume-based non-unix neu tools designed to encourage quiet balkanization and vendor/dev lock-in after being pushed by vendor payola.
See:
Please consider gitlab . Its on-prem fulfils most of your requirements, and when installed by omnibus RPM it kinda does it all for you. It’s going to be maybe 5 commands on top of a bare machine setup.
And please consider spaces and hyphens. Gluingwords togetherlike thatcan make it hard to read.
Please don’t confuse skype4biz and Skype. The former only borrows the name, and shares a lot of code with teams, Lync and probably netmeeting.
The latter will be missed.
The article seems to not understand the difference between a subdomain and a name.
No poInt in reading.
I was gonna suggest this. Norway or Denmark do this for speeding tickets and it’s very effective.
webapps
web apps
selfhost
self-host
They gave you an inch, and
This leaves a sour taste in my mouth.
You wanted a mile?
FY;DW - is there a summary made with letters on a a page?
The one below, named Anubis, is the one I heard about. Come back to the thread and check the link.
Only for security reasons.
And build-deployment validation.
And efficiency.
Who cares about all that?
I stopped reading at “literally”, which was early-on.
We need a running service when a simple command will do?
How big an attack surface do you need?
Don’t worry, Snap: Flatpak and Tarballs are NOT better by much. And, chances are, the system package manager may be lacking in so many validation requirements that it’s not iso27002-compliant and thus could be junk.
There-there, Snap. Most people won’t even know why you suck.
Pease tell me you know of someone where this actually was true: that they made crazy money and they’re set for life.
Because, based on 30 years in and a complete lack of knowledge of anyone who got out and retired early, either personally and via someone I know, I conclude the only people for whom this worked were C-level. Even the smartest man I know didn’t cash in and get out.
I do know someone who retired at 48, though. He was a heavy duty mechanic. Paid off his house in a town he chose specifically for location, and bikes and kite-surfs all summer and skis all winter.
Yeah, mechanic. Union. Half pay for life is still half pay, but it’s FOR LIFE. He won.
People seem to think that those who choose permissive licences don’t know what they’re doing. Software can be a gift to the world with no strings attached. A company “taking” your code is never taking it away from you, you still have all the code you wrote. Some people want this. MIT is not an incomplete GPL, it has its own reasons.
As mentioned in another post, I had another motivation for preferring the BSD license over the GPL .
I maintained a security product for years after the original author left this mature project and focus on life things. In South Korea, 4 engineers used this GPL project internally, but when they went to submit changes back to the project, they were accused and tried for industrial espionage, as the laws in South Korea could be construed to have bearing.
They lost. They’re in jail. The FSF took on their case, but was unable to change that. And, in reality, they were jailed for fulfilling the license requirements.
Since then, I simply cannot guarantee that people will be free from penalty when following the license terms, and I carry a lot of guilt over it – it ultimately led to my scaling-back on work and then moving off the project completely. But the code I do write, I prefer the BSD license. I cannot control or predict what people will do, and I certainly cannot control the action of companies when even the FSF can’t steer them properly.
I have no issue with people choosing the GPL; consider it, choose it, support it, that’s all good and well and proper. Keep doing that, and were my support ever needed, you’d have it. But my choice is different.
I got a LOT of flack when I mentioned this before; like I’m some turncoat or cuck and not allowed in the techbro club. And while their opinion is unassailable, its value scales accordingly. Bless their heart.
We need to move the hosting
… And cover this heavy-handed approach in an NPoV smackdown that will never be deleted.
You configure the VPN in the router the roku connects through.
Short answer: yes.
One of the tenets of security is that a user or process should have only enough access to do what it needs, and then no more. So your web server, your user account, to your mail server, should have exactly what they need, and usually that’s been intricately planned by the distro.
If you subvert it you could be writing files as root that www-data now can’t read or write. This kind of error is sometimes obvious and sometimes very subtle.
Especially if you’re new to this different access model, tread carefully.
Great news! If you mess it up, many distros are really great at allowing you to compare permissions and reset them. The bad news is that maybe you’re not on one of those. But you could be okay.
Tell me this Ai is in-box and not external like all the others.
If not, there’s gonna be a shed load of upset boomers who killed their net and can’t get it back.