If only they’d change the dumb way date time entry works for the calendar it would be near perfect.
If only they’d change the dumb way date time entry works for the calendar it would be near perfect.
Using Evolution for desktop but about to give Thunderbird another shot I think.
Usually on my desktop connected to vscode-server, but when I’m remote, yes.
I use a Samsung Tab 9. Then supplement with a server running VSCode-server and other things. I would prefer Linux, and sometimes use TermuxX11, but it was the best I could come up with.
Really? Have you set up services with docker before? I found it super easy compared to other systems. Curious what specifically threw you as I barely did anything except spin it up.
Don’t even need tabs with screen
You’d think, but the macs held up great, and were easier to replace as they were often rented so needed to be sourced regularly.
Woa… I have become those whom I cherish. Haha
It’s the cold. See comment: https://lemmy.nowsci.com/comment/10188718
It’s the cold. See comment: https://lemmy.nowsci.com/comment/10188718
This is because of the cold. Apple Laptops dominate because they are (were at the time, anyway), the only screens that would survive those temperatures.
Reference: I designed and led the build of the system used by the Barrow Arctic Science Consortium for managing equipment and rentals for scientists in the arctic back in the 2Ks.
I think you are confused. You can use ELK under AGPL with this news going forward. The fact that they have to retain SSPL, too, because of previous contributors under that license, has nothing to do with the fact that you can use AGPL going forward. I’ve read your other responses,but they all seem to go down the same seemingly incorrect direction.
Am I missing something?
You got me so excited, your comment needs an edit. PWAs are not supported on Firefox desktop. The article even says so. It recommends an extension that is super janky requiring manual CSS edits to files in the FF folder, and multiple profiles. (from experience).
I guess they magically knew it was them? And there you go again with “work.” Shadowsox has already been mentioned for randomized https traffic. Feel free to learn from the other comments.
He literally said he had already been identified. Read.
You, as a network engineer, at a business, where SSH is normal. This is not your realm, as schools look for very different signals. They are rarely actively monitored, but when they are, SSH will 100% look suspicious, and this individual already has a flag on them for tor, so yes they go beyond MAC and can identify them. You haven’t even asked what kind of school it is, how they access school content when on the network that could identify their machine, or what the risks are for getting caught, yet you want to push a method when others have provided better8 options for obscurity. I am looking out for this kid’s (or adult’s) well being.
Yes, your method works to bypass a firewall, I have even used it myself many times. But it is absolutely not the best option here. And before you ask for credentials again, yes, I have network security experience in multiple domains, including corporate provided POC exploits for software you would know the names of, threat modeling for highly sensitive data, and organization and management of certified systems, along with knowledge of school network infrastructure.
Again these are all assumptions. These are risks that do not need to be taken when there are better methods.
Putting this here,too:
Highly identifiable. Do not do this. Will it get you through the firewall? Yes. Will it get you in trouble when they see all your traffic going to one place? Also yes.
Highly identifiable. Do not do this. Will it get you through the firewall? Yes. Will it get you in trouble when they see all your traffic going to one place? Also yes.
This is why I switched from Ubuntu to Debian.