They shouldn’t play with our food. Food is not a toy.
They shouldn’t play with our food. Food is not a toy.
Yes, that’s the body position where the spider silk is made. But spiderman is wearing trousers (and underpants I suppose).
There was a (ig nobel prize winning?) study which asked the question if someone could pollute a clean or sterile environment by farting into it: The team of scientists concluded that it is safe (regarding… particles) as long as you wear underpants/ trousers. (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1121900/)
So…
:) the hardware is still more capable than a brick:
Plug in favourite installation media stick, push reset button (if there is one), reinstall.
Can an OS be bricked?:
A brick (or bricked device) is a mobile device, game console, router, computer or other electronic device that is no longer functional due to corrupted firmware, a hardware problem, or other damage.[1] The term analogizes the device to a brick’s modern technological usefulness.[2]
Edit: you may click the tiny down arrow if you think it can’t. ;)
Mars does not have a strong magnetic field like Earth does, so solar winds can strip away bits of the atmosphere.
I wanted to say the same. And furthermore I wanted to add that it’s beside the point of the comic. But I still wanted to say it.
One aspect is how interesting you are as a target. What would a possible attacker gain by getting access to your services or hosts?
The danger to get hacked is there but you are not Microsoft, amazon or PayPal. Expect login attempts and port scans from actors who map out the internets. But I doubt someone would spend much effort to break into your hosts if you do not make it easy (like scripted automatic exploits and known passwords login attempts easy) .
DDOS protection isn’t something a tiny self hosted instance would need (at least in my experience).
Firewall your hosts, maybe use a reverse proxy and only expose the necessary services. Use secure passwords (different for each service), add fail2ban or the like if you’re paranoid. Maybe look into MFA. Use a DMZ (yes, VLANs could be involved here). Keep your software updated so that exploits don’t work. Have backups if something breaks or gets broken.
In my experience the biggest danger to my services is my laziness. It takes steady low level effort to keep the instances updated and running. (Yes there are automated update mechanisms - unattended upgrades i.e. -, but also downwards compatibility breaking changes in the software which will require manual interactions by me.)
horse for my bed
Godfather says: be careful what you wish for.
You might be confusing public IP addresses with ports?
I mean publicly addressable address like in: not in a private network where SNAT/ masquerading is in place between the torrent-client’s host and the Internet.
It was mentioned, that no port forwarding is in place.
Not sure why you would sometimes see your status as fully connectable
One side of the connection needs a public address, not both. When both parties don’t have a publicly addressable IP, the status is firewalled. I guess.
He used an inch tape measure and converted the height to cm I guess.
Must be one of those rare arctic forest dolphins. I’m almost certain.
Let the patch be part of the code for one or two minor releases. Then revert the changes of the patch.
He looks like he’s pondering about whether to take that business deal or not.
A symbiotic relationship?
I assume you want to access a self hosted service on your local server from the Internet.
To make the service accessible from the Internet multiple things are required:
I know of a web conferencing software which has one video per shared camera and a shared screen video. How many automatic pop-out pip windows will I get?