How can I make this my prompt on zsh
?
How can I make this my prompt on zsh
?
You don’t use the C:/> </
terminal prefix and suffix prompt on your smartphone?
Was this due to DMARC/DKIM, SPF or something else?
I’m entrenched in Apple devices but in love with Linux on embedded devices, VPS servers, etc. I remember the magic of my first Linux install (Red Hat Linux on a Windows 3.1-era IBM ThinkPad that ran Windows 2000 flawlessly), and I’m really considering picking up some midrange laptop for a desktop install of Linux.
macOS does this too shockingly despite using the file extension as a “hint” to the file type. I think it’s unique in that most UNIX/Linux systems use magic number and Windows blindly accepts that the file is of the type that matches the extension.
I hate that they block VPNs, I’m forced to route Reddit traffic through my home router. I usually use a redirect to an alternate frontend but it’s been buggy lately.
And if you’re looking for legitimate reviews, good luck! Everyone’s an affiliate now.
I’ve been using this for about a year, but at work I’m still on Google (don’t know why).
What’s weird is SearXNG seems like it gets better results now, even though they’re just coming from the others.
One thing I like is that I can switch instances to get varied results based on the instance’s geographical location. In other words, it doesn’t feel like anything’s targeted.
And it’s definitely not simple. I hate dealing with AWS at work, shit is overly complex where it doesn’t need to be.
I’m noticing other comments are mentioning other services so I’ll just throw another one out there: Storj
I have a NAS, but use Storj for off-site backup. The performance, client-side encryption (by default) and price are all winners in my book. They’ve got an S3 gateway too but I personally avoid it due to it needing keys for encryption.
(I also used to rent out excess hard disk space to their network in the early days but that’s another story.)
My wife does this in the dental industry. She’s got loads of questionable quality USB sticks and I haven’t gotten her to copy it all to our NAS.
In high school I used to pass USB flash drives in an Altoid can (to protect it), good times.
I also used to be the CD-R guy (and later DVD+RW) for my group of friends, I was really into .cue
sheets and putting hidden tracks on those (including dumb shit like seeking back in the middle of a slow song would reveal heavy metal or something).
These days I host a Tailscale network — unfortunately with residential upload speeds being trash, I’ve moved all my Blu-ray rips to Storj and set up a WebDAV gateway on a VPS (running Tailscale). It’s fast as hell but I’m not in love with decrypting on the VPS.
To add to this, I’d personally just clone the card immediately to somewhere else then do all the recovery efforts on the clone; if only to avoid burning out the SD card even more during recovery.
Edit: Not sure if that would be better or worse.
Wouldn’t the country and domain dissolving mean it can be reassigned? I don’t understand why after that it would still be considered a country TLD only available for future countries.
It’s strange to me that they wouldn’t simply reassign control of it to another… erm, what’s the word?, at least for the technology-related domains.
Kill bytedance
What are their network CIDR blocks? Only half joking…
I get it that everyone wants ad blockers in their browser, but it doesn’t solve the problem of resources loading outside the browser.
I think DNS or IP filtering is much more effective. I only bring it up because everyone uses apps all the time and I’m constantly seeing apps trying to connect to tracking domains.
If you’re just looking for WireGuard with some good support for hostile networks (and easier configuration) I’d probably just recommend Tailscale.
That doesn’t really solve the issue of others near the public network being able to sniff out which IP addresses you’re connecting to. In fact, they could deny service to your DoH provider and force DoH not work (if they did the same to the VPN endpoint hopefully your VPN has a kill switch).
As for shifting the entity that sees your network traffic, that’s true and you definitely have to trust the VPN provider (and whatever company their traffic is passing through).
I had to start hashing passwords and sending it to the haveibeenpwned API.
I also fight with my users over data normalization because any time I add some rule (like don’t put “SO#” as part of the value of the “SO#” field), they’re too stupid to realize the point and find some other “hack” around it.