

I like zerotier over wireguard because it’s one layer lower. So anything that uses Ethernet frames can be routed over it like it was a network switch plugged into your computer. This is probably why mdns works.
I like zerotier over wireguard because it’s one layer lower. So anything that uses Ethernet frames can be routed over it like it was a network switch plugged into your computer. This is probably why mdns works.
What’s saturated light and what is bingodabbing?
That’s kinda an insane amount of ram for most simulations. Is this like a machine learning thing? Is his python code just super unoptimized? Is it possible he’s making a bunch of big objects and then not freeing the references when he’s done with them so they’re never garbage collected?
In that case it’s highly unlikely your problem is with DNS. And much more likely it’s a problem with the actual connection to the server. If you are willing to share the IP/domain I can help troubleshoot (either here or in a DM).
If you do a DNS lookup (through nslookup
or many other tools) on the client you’re using to connect, does it get the right IP back?
Sorry I completely misread your comment to be saying that the maximum efficiency was 50% not that it occurred at 50%.
I believe for the highest efficiency you only want to use about half of the rated power of the PSU. So if your system draws 350W, 700 is a very reasonable power supply
Shouldn’t it be the median person?
For me that’s under Internet > Saved Networks > network name > Share, instead of doing it from the main list of networks
Yeah. Open one PDF normally. File > import a second one and select whatever option imports by appending pages.
This is a really good question!
I believe the general answer is, until the compressed file is indistinguishable from randomness. At that point there is no more redundant information left to compress. Like you said, the ‘information content’ of a message can be measured.
(Note that there are ways to get a file to look like randomness that don’t compress it)
By default, an enencrypted boot drive is not sufficient to be able to decrypt a LUKs drive. If you have to type in your password to start the computer/unlock LUKs then you should be good.
If you’ve setup a keyfile or TPM based decryption of LUKS, then your data is probably not safe (though a TPM based decryption could be if the OS is secure and secure boot is setup properly)
In this case, if you have another server then you could setup a mutual tang/clevis system where each device gets the keys it needs from the other server on the LAN. Both would be LUKs encrypted. So if one is online the other gets the required key from the online one while booting. But if both are offline then no keys are available and you have to type in a LUKS password to boot. Something like https://www.ogselfhosting.com/index.php/2023/12/25/tang-clevis-for-a-luks-encrypted-debian-server/ but what they do with multiple servers is probably overkill
That’s probably only for selling steam keys on another store. You might be able to sell non steam versions for any price you want
The original is something like “it’s all Ohio” “always has been”. The globe shown is just a large landmass that looks like Ohio. They’re probably astronauts since you’d have to be in space to see it. The astronaut killing the other has the Ohio flag on them and is killing them for knowing too much.
If there’s a 0 day in the VPN software then I’m also probably boned. The chances of that seem on par with the likelihood of an openssh vulnerability? I feel like vpns are useful to secure services without good authentication, but their use in front of an openssh server has never made much sense to me.
I think point two may be wrong. The strength of a shell should be proportional to its thickness, which would scale linearly with its size (assuming the shell got thicker in proportion to the size). There’s definitely a point where a self supporting egg requires very thick shells like you said, but the scaling law you gave uses the wrong change.
I believe a bot/site that mirrors reddit subreddits to Lemmy communities. It’s anything @lemmit.online
It’s pretty trivial for them to block all major instances though, or even all instances federated with all major instances
Yeah it’s worked everywhere I’ve tested. But that’s only really been airport WiFi, so I’m not sure it’s indicative of it working in general. It’s easy enough to setup for testing that it’s probably worth a shot