tedvdb

joined 1 year ago
[–] [email protected] 2 points 1 month ago (1 children)

What do you need to pass trough? I've done usb passthrough in the past with docker as well

[–] [email protected] 5 points 1 month ago (3 children)

I'm running a normal linux distro, with everything running in containers using docker compose files. No VMs, since they are overkill for my needs. I'm running stuff like the *arr stack, home assistant, smokeping, unifi controller, pihole etc. Setting it up is quite simple, and the distro can be whatever you prefer (I use Arch btw).

[–] [email protected] 20 points 1 month ago (1 children)

Yust buy a SAS controller (with cables), they are used pretty cheap.

[–] [email protected] 2 points 2 months ago

Why do you still want to extract the encrypted data? Do you still have the encryption key somehow? Else even if you desolder the storage, manage to dump the raw bits, you won't be able to get anything useful from it.

[–] [email protected] 12 points 3 months ago (1 children)

That's a lot of memory

[–] [email protected] 31 points 3 months ago

Now the dev doesn't need to comment this part of the code, saves him time.

[–] [email protected] 35 points 3 months ago (3 children)

Yes, e.g. outlook replaces links in mails so they can scan the site first. Also some virusscanners offer nail protection, checking the site that's linked to first, before allowing the mail to end up in the user's mail client.

Thats why you never take actions on a GET request, but require a form with button for the user to do a POST.

[–] [email protected] 11 points 8 months ago (10 children)

Why then not just use ZFS or BTRFS? Way less overhead.

Ceph's main advantage is the distribution of storage over multiple nodes, which you're not planning on doing?

[–] [email protected] 1 points 10 months ago

In singular(?) it's "kind". So that doesn't work out. 1 kind, 2 kinderen.

[–] [email protected] 0 points 10 months ago (2 children)

No they aren't. There are kinderen.

[–] [email protected] 5 points 10 months ago
[–] [email protected] 4 points 11 months ago (1 children)

How do you know this?

Besides that, this is just a list providing burner email addresses. Adding Outlook to this list makes sense. If sites are using this list as a blocklist that would cause issues, forcing them to not use this as blocklist anymore.

view more: next ›