

Can’t you just replace the entire game folder?
Running a verify and repeating the action would even show how many files were changed.
Keyoxide: aspe:keyoxide.org:KI5WYVI3WGWSIGMOKOOOGF4JAE (think PGP key but modern and easier to use)
Can’t you just replace the entire game folder?
Running a verify and repeating the action would even show how many files were changed.
Insert payed-paid bot here telling you payed is for boats and paid for transactions.
Now I see shit again too. The unfortunate author may be torn on what to do.
Edit: https://github.com/AasishPokhrel/shit/issues/21
This issue mentions the name was changed.
Wanted to reorganize my /mnt once and did an rm -r … without unmounting the network share of production.
We have backups now.
Access is also a full “cms” for constructing program interfaces, ui.
I have seen fully fledged programs written in it, and it wasn’t pretty.
Dynamics sounds like it is “excel/sql with data analysis strapped on”, where access was “excel/sql with frontpage strapped on”
Interesting. How does it compare to ms Access (in the 90s I guess)?
Was about to say this.
I saw a small-time project using hashed phone numbers and emails a while ago, where assume stupidity instead of malice was a viable explanation.
In this case however, Plex is large enough and has to care about securiry enough that they either
did this on purpose to make it sound better, as a marketing move,
did not show this to their security experts,
or chose to ignore concerns by those experts and likely others (turning it into the first option basically)
There is no option where someone did not either knowingly do or provoke this.
Most attacks on servers are on the connections. All IPs are owned by entities part of countries, so your IP is always under someones jurisdiction. The same is true for regulsr DNS entries, so the domain of that server.
For getting the data however, there also isn’t any protection in international waters. Someone would just raid you and you could do nothing about it. What good is lawlessness if you don’t have the ability to enforce your own “laws” about not having your data taken away?
You could lay low so noone bothers with that, but then you could also just lay low with regular secretive hosting.
The admin team is distributed and the infra is in europe iirc.
So no
I have that exact setup working. qbittorrent (and -nox) are a lot more involved to set up with I2P, but there is some material on how and once you get it running it works quite well at this point.
I don’t use docker for it, but that should work too. For browsing I use a maintained fork of proxy switchy omega, which allows to choose a proxy profile based on the url, making it easy to pipe i2p pages into the i2pd socks port (I use I2Pd not I2P, don’t think it matters much). qbittorrent can be configured in the same way to statically use the the local (4447 on i2pd) port as a proxy to prevent any clearnet communication. In addition it needs the dedicated I2P host 127.0.0.1 and port 7656 (the sam bridge, giving deeper access to I2P).
Don’t expect to do anything on the clearnet over I2P, the exits are not good and it’s not what I2P is meant for. For that reason don’t set I2P up as something like a system proxy/vpn, instead pipe the specific programs you want using I2P into the proxy ports using their proxy settings.
To get rid of the firewalled status in the I2P daemon, you will need to forward ports. Maybe you have seen advice for servers that are not behind a firewall and nat, so that effectively have all ports “forwarded” already. The mythical dedicated IPv4 address.
In your case you need to pick the port your I2P daemon uses for host to host communication randomly, then forward both TCP and UDP for it on IPv4. Also make sure you even can forward ports, depending on region ISPs no longer hand out dedicated IPv4 even per router, so you might have to specifically ask your ISP for one (I had to). But that is all generic hosting, if you can set up a minecraft server you can make I2P have full connectivity.
What’s the issue with a 4k screen? I love my 4k phone, lower dpi displays just look plain worse and pixelated to me.
Especially for reading it’s a game-changer, it made my eink reader redundant for me.
Look into I2P.
It’s a network similar to TOR, but more suited for usecases like torrenting.
For anything you do on I2P, you can rest assured noone else can even in theory trace it back to you.
Go visit http://tracker2.postman.i2p for a large collection of public domain content.
The only issue is that there is also a lot of content available in german and english language which is not in the public domain, and due to the anonymous nature of I2P noone would be able to warn you of that. So take care you don’t accidentally seed the content to others, keeping it online for even more people to commit the same mistake with noone the wiser.
The blue thing (avali I believe) still has wings, so I’d say it’s merely a bit less readable.
away
Like, from you personally?
Aside from Australia or Japan, a move should improve the average ping users experience.
Most people are not from the us, and given its geographic location nowhere close to it either.
ISPs on a voluntary basis, not the nation
Based on the only information we have, OPs sister is two. So the sister is 2. Trivial.
Every user of that spotify beta was a leech and spotify was the only seeder for all of them.
The meta defense only works if you make an llm output a more or less corrupted version of your warez.
100k left