DeltaTangoLima

joined 1 year ago
[–] [email protected] 43 points 7 months ago

fknlol - like people WFH are working from their bed. I can't think of a more uncomfortable location for my to do my job from. Except the office five days a week of course...

[–] [email protected] 6 points 7 months ago

Thanks for the share - have grabbed the latest Firefox repo for my private Forgejo.

[–] [email protected] 6 points 7 months ago

I haven't gone into detail on this, but I suspect some shiny-suited, greasy-haired wanker lawyer has been able to make a case that things like site-specific CSS classes and the like can somehow be covered by DMCA.

I'm 100% speculating (not American, not a lawyer) but it's more than URIs and Javascript, is what I'm saying.

[–] [email protected] 10 points 7 months ago* (last edited 7 months ago) (1 children)

I use Nginx Proxy Manager and Authelia for just this. Authelia supports a wide range of identity and MFA providers.

Edit: although Authelia has an article on how to set it up, I found it still missed some key info. This article was the one that helped me most in getting it to work.

[–] [email protected] 2 points 7 months ago* (last edited 7 months ago)

I run Proxmox with a few nodes, and each of my services are (usually) dockerized, each running in a Proxmox Linux container.

As I like to keep things segregated as much as possible, I really only have one shared Postgres, for the stuff I don't really care about (ie. if it goes down, I honestly don't care about the services it takes with it, or the time it'll take me to get them back).

My main Postgres instances are below - there's probably others, but these are the ones I backup religiously, and test the backups frequently.

  1. RADIUS database: for wireless auth
  2. paperless-ngx: document management indexing & data
  3. Immich: because Immich has a very specific set of Postgres requirements
  4. Shared: 2 x Sonarr, 3 x Radarr, 1 x Lidarr, a few others
[–] [email protected] 9 points 8 months ago (4 children)

Lol. The perils of replying to Lemmy posts while in work mode.

Helluva Thunderbolt cable, eh?

[–] [email protected] 6 points 8 months ago* (last edited 8 months ago)

~~Thunderbolt v3 handles up to 100W. I have a 90W USB-C port on one of my monitors for just that purpose.~~

Edit: lol. I see my mistake. Edited. I deal in kW and MW for my job. I'll call it muscle memory.

[–] [email protected] 40 points 8 months ago* (last edited 8 months ago) (9 children)

This dual-port charger can only output 45W of power when using one port at a time, with the output halved at 22W to each device when plugging in two simultaneously.

Yes. That's literally how max power ratings on devices like this work. And, to be that guy, even when plugging in two devices and getting 22.5W on each socket, the charger is still outputting 45W.

This feels like a paid advert written by Ikea's press department - not The Verge itself.

[–] [email protected] 21 points 8 months ago (6 children)

I believe they used the middle finger on their right hand, and depressed it on the second (right) button of their mouse.

They could possibly be using their mouse in left-handed mode, which might've meant using the index finger on their left hand to achieve the same action.

Then again, it's possible that they're using their mouse in mirrored, left-handed mode, and they could've used the middle finger on their left hand to depress the primary (left) button of their mouse.

Of course, this only covers hand use of a traditional mouse. I can't speak as to whether OP is using an upright, ergonomic mouse of some sort, of even a stylus and tablet. There's just so many possibilities!

[–] [email protected] 8 points 8 months ago (1 children)

If feel this is (unintentionally) stretching the use of the word cyberattack. Rightly or wrongly, most people consider a cyberattack a form of hacking/attack that's executed via a network or the internet.

I know its true definition any form of attack against data, network, or computing device (including smartphones), but this headline could easily lead people to think their phones could be set on fire by some anonymous l337 hAx0r over the internet.

While technically true, it requires physical exploit first.

[–] [email protected] 1 points 8 months ago

Is that the one started by the bloke on YouTube - Jerry Rig Everything?

[–] [email protected] 2 points 8 months ago* (last edited 8 months ago) (1 children)

I think I remember some kids' rhyme about an old lady who swallowed a fly..?

Edit: this one

view more: ‹ prev next ›