The CVV should really be 2FA from your card issuer.
For anything important, use matrix instead of lemmy DMs.
The CVV should really be 2FA from your card issuer.
That one standoff got loose 12 years ago, so none.
Otherwise, it’s all HDMI and DP.
Updated my journal
Duck with duck shoes.
Thanks, I feel closure
Edit the sudoers file.
## user is allowed to execute halt and reboot
whateverusername ALL=NOPASSWD: /sbin/halt, sbin/reboot, /sbin/poweroff
Overmorrow refers to the day after tomorrow
Figured the other way around might be as obscure…
nudiustertian: relating to the day before yesterday
Yikes
Browser add-ons would be better suited for this.
Those uninterested don’t get spammed and it’d work on all websites for those who want it.
I love mine, it’s so gentle and civilized.
I wish they made a modern version with the adjustable slice width thing, it’d be perfect.
Search for your username in the modlog
This toaster:
Might as well link the Technology Connections video already.
Yes, it’s an 18 minutes video on a 1950s toaster, you can thank me later.
Right, everyone knows telnet makes you gay.
It’s all detailed in the RFC854 for the telnet protocol by J. Reynolds and J. Postel. (Gay was pronounced with a J back then, like gifs)
That’s why they later invented SSH to uh… secure you from… the… gay packets…?
Source: am network engineer.
Sorry your mom sucks.
Not my parents, but I’ve had a narcissist work colleague pester me about my partner and I not wanting to have kids, trying to convince us I guess, using her ultimate argument…
Her: But… you need to have kids so they take care of you when you’re old!
Me: So… wait. Is that the reason you had kids?
Her: Well yea! (like that’s the only logical answer, duh)
Me: … wow …
Fast forward. Her kids are all grown up now, they’ve since cut all contact and she hasn’t seen them nor her grandkids in years. I run into them once in a while and I’ve helped them out with a handful of times with things like moving or maintenance or tax reports or whatever. There’s a few things they never really got to learn growing up and anything they could ever do was never good enough for her, even though she’s terrible at most things.
Now and then, she’d still complain about them being ungrateful and I’d just ignore her… she’s never once come even close to the self-awareness that she drove them away by being a narcissist asshole.
She’s retired now, so neither of us have to deal with her now.
Great fucking plan, having kids to guilt trip them into caring for you…
They had the guts to move on and I’m proud of them.
I was probably the first to tell them so, some random passerby.
Fuck narcissists.
The problem is there’s likely not a universal solution that’s guaranteed to clean everything in every case.
Cleaning specific logs/configs is much easier when you know what you’re dealing with.
Something like anonymizing a Cisco router config is easy enough because it folllows a known format that you can parse and clean.
Building a tool to anonymize some random logs from a specific software is one thing, anonymizing all logs from any software is unlikely.
Either way, it should always be double-checked and tailored to what’s being logged.
It depends a lot on what the application is logging to begin with.
If a project prints passwords in logs, consider to just GTFO as it’s terrible security practice.
There might also be sensitive info that’s not coming from a static thing like your username, but from variable data such as IP addresses, gps coordinates, or whatever thing gets logged.
Meaning a simple find&replace might be insufficient.
When possible, I tend to replace the info I remove with a short name of what I replaced out as it’s easier to understand context when it’s not all **********
or truncated.
example:
proxy_container_1 | <redacted_client1_ip> - - [17/Aug/2024:12:39:06 +0000] "GET /u/<redacted_local_user2> HTTP/1.1" 200 963 "-" "Lemmy/0.19.4; +<redacted_remote_instance3_fqdn>"
keeping the same placeholders for subsequent substitutions helps because if everything is the same, then you don’t know what’s what anymore.
(this single line would be easy enough either way, but if you have a bunch and can’t tell client1 from client50 apart anymore that can hinder troubleshooting.
regular expressions are useful in doing that, but something that works on a specific set of logs might miss sensitive info in another.
I’m sure people have made tools to help with that, possibly with regex patterns for common stuff, but even with that, you’d need to doublecheck the output to be 100% sure.
It helps a lot when whatever app doesn’t log too much sensitive info to begin with, but that’s usually out of your hands as a user.
I have a vague memory of this but it might have been an extension.
If I got any writing done, the characters would be productive and actually finish writing stories instead of procrastinating like me.
Coming from /all and because a few users reported it…
My guess is when taken without context, the title kinda reads like something from a MAGA outlet.
Now, the article obviously isn’t, but sadly, not everyone reads articles.
RTFA, people.
So I recently had a conversation with some who though Linus Torvalds (kernel) and Linus Sebastian (Linus Tech Tips) was the same person.
That was a pretty funny and confusing conversation.
an ancient card with a colorful box from 3dfx.
I think it was a voodoo 2, but not one that came bundled with creative soundblaster.
Yes, we needed another physical card for sound.