This is a bad idea. If breaking the law of any country can result in extradition to that country then people are going to be getting extradited for things like disrespecting the communist party.
This is a bad idea. If breaking the law of any country can result in extradition to that country then people are going to be getting extradited for things like disrespecting the communist party.
Having a non-garbage domain provider can be a luxury. I used to work at a place where we were paying boatloads of money for certificates from Sectigo for internal services, and they were charging us extra per additional name and even more if we wanted a wildcard, even though it didn’t cost them anything to include those options. Getting IT to set up the DNS records for Let’s Encrypt DNS verification was never going to happen.
I’m pretty sure browsers stopped distinguishing EV certificates years ago.
A large percentage of those hosts with SSH enabled are cloud machines because it’s standard for cloud machines to be only accessible by SSH by default. I’ve never seen a serious security guide that says to set up a VPN and move SSH behind the VPN, although some cloud instances are inherently like this because they’re on a virtual private network managed by the hosting provider for other reasons.
SSH is much simpler and more universal than a VPN. You can often use SSH port forwarding to access services without configuring a VPN. Recommending everyone to set up a VPN for everything makes networking and remote access much more complicated for new users.
Shodan reports that 35,780,216 hosts have SSH exposed to the internet.
Moving SSH to ports other than 22 is not security. The bots trying port 22 on random addresses with random passwords don’t have a chance of getting in unless you’re using password authentication with weak passwords or your SSH is very old.
SSH security updates are very infrequent and it takes practically no effort to keep SSH up to date. If you’re using a stable distribution, just enable automatic security updates.
Having SSH open to the internet is normal. Don’t use password authentication with weak passwords.
For me it’s a combination of alerts being sent to the wrong areas and a disagreement about importance. I don’t need an alert if it’s hot outside, nor do I need an alert for every update about an earlier alert. People aren’t turning off alerts because they don’t know how to turn them on.
It’s also ahead of gitea in some aspects: https://forgejo.org/faq/#is-there-a-roadmap-for-forgejo
There’s a browser extension for that. It also works on Pintrest and other useless sites. https://iorate.github.io/ublacklist/docs
It is possible to remove the referer header:
intel’s WiDi software supported Miracast, which is a standard.
Or use Miracast, AKA WiDi, Smart View, SmartShare if you just want to mirror a screen.
In theory, running a serverless function can provide adequate response times at costs that are unreachable with private servers. It’s basically those services that would run your application for few minutes every time it received a request, but with theoretically lower overhead since it’s supposed to be a function instead of a full application.
You don’t need a static IP to have a domain name, and you don’t always need to pay for a domain name either.
Apple doesn’t want it to be VR. They want people to buy this expensive VR headset and wear it all day, but you can’t wear it in public because of how silly it looks, and you can’t carry it around everywhere because it doesn’t fit in your pocket and you can’t just toss it in a bag without damaging it, and you can’t even just wear it around your house unless you’re moving from outlet to outlet. The Vision Pro is an impossible cross between Facebook’s Quest Pro and Smart Glasses products. The technology to make a successful product out of it doesn’t exist yet.
There are ways to use the Vision Pro as a regular VR headset, but then you’re paying for things you’re not using.
That Pentum is a budget CPU from just over 10 years ago. It has PCIe 2.0. Maybe the “gigabit” ethernet is connected to the CPU by a single 500Mbit PCIe lane.
How is the drone going to determine that it is being used to commit a crime?
Docker Swarm encryption doesn’t work for your use case. The documentation says that the secret is stored encrypted but can be decrypted by the swarm manager nodes and nodes running services that use the service, which both apply to your single node. If you’re not having to unlock Docker Compose on startup, that means that the encrypted value and the decryption key live next to each other on the same computer and anyone who has access to the encrypted secrets can also decrypt them.
China is simultaneously destroying the environment for profit and investing too much money in green technology?
A distinctive feature of purchase subsidies for BEV in China, however, is that they are paid out directly to manufacturers rather than consumers and that they are paid only for electric vehicles produced in China, thereby discriminating against imported cars.
That’s an interesting way to spin subsidies on the production of electric vehicles. Why would China pay companies in other countries to produce cars?
There is no such company. This is just another way to ban “harmful” content. Verifying your identity and age to access restricted content is practically guaranteed to result in your identity being compromised within your lifetime.