Hey, ChatGPT, my uncle says new Macbooks are just glorified Raspberry Pis.
How many MB/s are in a Raspberry Pi?
Hey, ChatGPT, my uncle says new Macbooks are just glorified Raspberry Pis.
How many MB/s are in a Raspberry Pi?
It's in the archwiki 😤😤😤
Keys and tokens will be shared securely via singaporean hotels wifi.
If your comments have been federated to other instances, they will be there until they are deleted locally. If someone clicks on your user profile, they will get a DNS error if the domain is no longer there. Images in the comments pointing to you instance will be broken too. Nothing terrible actually happens.
Migrating accounts a la Mastodon is not happening soon in Lemmy.
My advice is: Go on and save some money.
I'm too lazy to label them. So, I usually keep the PDs connected to the charger and that's it.
But if it becomes a problem I'll probably use a wire labeler.
It would be nice if they came labeled from factory, though.
Modern problem: *exists
thAt bEcaUse le USA baD
so, jesus can it?
Sorry to read that.
I've dd
ed an external drive instead of an SD card once by mistake. I've never felt more stupid than that day.
Rich stupid guy doing things is not technology. Why is this community flooded with this guy doing or saying things?
It's running NetBSD, isn't it?
Some security tips:
Firewall should block everything by default, and you start allowing incoming and outgoing connections when you need them or if something fails.
Disable passwords and root access in ssh daemon.
Use fail2ban or something similar to block bots failing to log-in.
Use random long passwords for everything (eg: like databases). And put then in a password manager. If you can remember the database password, it's not strong enough. If you can remember the admin password for a public web service, it's weak.
Don't repeat the passwords. Everything should have its own random long password.
.env files and files with secrets should be readable only by its service user. Chmod them to 400.
Monitor logs from time to time to see if something funny is happening.
Hey! I had no idea that was possible. I usually encrypt everything but /boot, because it's easy that way.
I don't have a "threat model" of someone puting malware in /boot while I'm away of the computer. But it would be nice to know how to prevent that.
Do you have a link of a guide or tutorial for that?