![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.one/pictrs/image/0f5e05b5-d351-4add-9667-1df4c43091b4.png)
I had analytics turned on (new phone and didn’t check it before), and the app info only shows 76 kB have been transferred in the past 30 days. Seems pretty reasonable, but I disabled it anyways out of principal.
I had analytics turned on (new phone and didn’t check it before), and the app info only shows 76 kB have been transferred in the past 30 days. Seems pretty reasonable, but I disabled it anyways out of principal.
As an aside, these are the client logs, check the /var/log/ auth.log or secure files or journalctl to see if the server logged why the access was denied.
You’ve always been able to run unsigned or unpackaged add-ons with developer mode. What’s wrong with that? This only affects packages uploaded to AMO.
The other option to the server that was posted is to get a DAS Enclosure that you can then hook up to a server or anything that can use a SAS/SATA card. These are generally going to be cheap because it is just a SAS/SATA backplane/expander.
Edit: eBay is useless. Here’s an example DAS https://www.aventissystems.com/HPE-MSA30-DAS-Storage-Basic-p/200051.htm
My line of business is entirely a Microsoft shop so everything we’ve ever written has been for MSSQL.
That being said, I can understand the benefits of having a choice in backend. For example, for our Zabbix deployment some engineer just installed mariadb+zabbix on a server and called it a day. This has caused us no end of troubles (ibdata misconfigured, undo files too small, etc). After the last time I had to rebuild it due to undo file corruption I swore that if it broke again I was switching to postgres. So far knocks on wood we haven’t had any major issues. We’re still looking into and planning for a postgres migration but we’re hoping to hold out for a little longer prep time.
Maybe I should contribute a MSSQL engine for Zabbix so I can move it to a platform I’m more comfortable with. ;)
It’s likely a Google Console verification file to show you own the domain (e.g. to make changes to search results). It has to be published to the site with a random url that only the owner and Google know, but it’s still a public file. I don’t think it’s an issue if it’s stored in source as Google will query the site and not the source for that file.
If OP is concerned they can also change the verification method: https://support.google.com/webmasters/answer/9008080?hl=en
The likely cause is that agetty itself does not exit when the shell exits, it simply respawns the login command. You can confirm this if the PID of the agetty doesn’t change.
If it does change (and systemd restarts the agetty process) then you might want to stop the service as one of the Exec statements of the service to prevent it from respawning.
Yes, but as I’ve found recently AES-NI is only as good as your software support for it. Had a team using an ancient version of winscp and they kept complaining about download speeds on our 10Gb circuit. Couldn’t replicate it on any other machine with the newest version of winscp so I installed their exact version. AES-NI support wasn’t added until like 2020 and it gave them 5x better download speed after upgrading.
Does cryptsetup/luks do that? I thought that was only software encryption.
You can, sure, but you probably shouldn’t. Encrypting and decrypting consume additional cpu time, and you won’t gain much in terms of security.
Hover over the window in the task bar and right click on the preview. This should show the restore/minimize/maximize dialog. Click restore if it’s an option then do the same and click move. You should be able to then use the arrow keys and “attach” the window to your mouse and move it to the visible area.
Edit: the other way to get this menu depends on the application but if you select the window and hit ALT and then space it should show the restore/minimize/maximize options.
One of my system engineers started using TFS a few weeks ago. All he knows how to do is click Sync Changes in vscode and call me if there’s a problem.
This is funny because most object storages now use keys that represents a path. For example, you can host a website on S3 with folders for js/css/etc and it “just works”.
There’s a tutorial that leads towards the first dungeon boss of the game, but after that it looks like you make your own challenges. There’s a few bosses around my level that I’ll be taking on next, then I’m probably going to explore to see if I can find more dungeons.
Honestly I would describe it as Ark-lite. It has base building/taming and that’s pretty fun, and you can also get random encounters at your base. The leveling system is a bit grindy. There are dungeons and bosses in the world to go find and explore. The map is huge, I think I’ve hardly explored a tenth of it.
Been playing about 15 hours or so and enjoyed it, but the game is definitely early access. I’ve had a number of crashes, fell through the world a few times, etc. I’d give it a month or two if that bothers you.
Avahi uses mDNS which is a multicast protocol. Multicast is designed to be link-local only: it ends at the edge of a broadcast domain. Router A would also need to bridge in order for that to work (i.e. Device A and B would need to have the same broadcast ip).
On the other hand, there are ways of setting up Multicast Forwarding if the router supports it, or you could have a device in both networks that does Avahi/mDNS Reflection.
https://www.cisco.com/assets/sol/sb/Switches_Emulators_v2_3_5_xx/help/250/index.html#page/tesla_250_olh/multi_forwarding.html https://serverfault.com/questions/121032/forward-mdns-from-one-subnet-to-another
I can’t believe this is 15 years ago. Still hear these in the song today. https://youtu.be/VWqC4KKiVbU
Since this is a github pages site, the whole thing can be downloaded from the git repo: https://github.com/xenevel/dark-souls-2-sotfs-cheat-sheet
Easiest is to select the green Code button and click Download ZIP. You should be able to open the index.html page in your browser and use it like normal. YMMV if this uses content/data from other sources/sites.
A torrent is broken into pieces, and further into blocks. The torrent file contains hashes of all the pieces that make up the full torrent. The client validates each piece that is downloaded and will re-download from another peer if an invalid piece is encountered. The spec goes in to more depth if you’re interested. https://wiki.theory.org/BitTorrentSpecification
29% of 112 and 60% of 170 is 134, which is 47.7% of the total. Math checks out.