damium

joined 2 years ago
[–] damium 4 points 9 months ago

Business systems from the 80s used to automatically convert everything name related to caps. It made it easier to do string matching which was generally case sensitive in the DB. It also made data entry easier as you just turn capslock on and type.

No so much formal as lazy semi-formal.

[–] damium 7 points 9 months ago (3 children)

The biggest issue is that your corners are lifting from the bed during the print. Fixing this is usually a combination of making sure the bed is clean and adding a brim to increase adhesion. Maybe messing with temperature and cooling fan settings for the first few layers.

Second is things look a bit over extruded. This could just be due to the corner issue though so fix that before any other changes.

[–] damium 4 points 10 months ago

The reasoning is that it is not illegal to fake most student ID cards but it is a federal offense to fake or alter government issued ID documents.

That way if it becomes an issue they can just pass it on to the authorities as their problem.

[–] damium 5 points 10 months ago

"Invalid" or "unparseable" are more understandable descriptors in normal language. I don't think I ever heard of garbage/junk being used for that in language theory but it may be domain specific usage.

[–] damium 2 points 10 months ago

There are a lot of edge case characters around visually indistinguishable names. If that is a concern usernames should use a restricted known character sets instead of trying to block specific characters. You likely should also treat lookalike characters as equivalents when checking for username overlap.

[–] damium 10 points 10 months ago

As someone who also has produced code that looks like random characters spewed onto a terminal while using fpdf, I feel this one.

[–] damium 14 points 10 months ago (1 children)

It can still have issues with potential attacks that would redirect your client to a system outside of the VPN. It would prevent MitM but not complete replacement.

[–] damium 2 points 10 months ago

Likely you needed to include the intermediate cert chain. Let's encrypt sets that up automatically so it's quite a bit easier to get right.

[–] damium 2 points 11 months ago

10.x.x.x is a private range. It won't be your externally visible internet address but it might be your router's WAN address if your upstream ISP is performing a NAT for IPv4 or if you have multiple chained routers in your network. If that is your router's WAN address you likely won't be able to use port forwarding for external access.

You can find your external address by visiting ifconfig.me or from a linux shell running curl https://ifconfig.me

My recommendation would be to start from the other direction instead. Try and get the reverse proxy working with a SSL and a test page then work on making your nextcloud instance visible. You can use a tunneled service from cloudflare or tailscale to avoid the port-forwarding and add a layer of security.

[–] damium 15 points 11 months ago (2 children)

IIRC the PS3 had it's firmware encryption key published not the source code.

[–] damium 2 points 11 months ago

There is also SMS passive reading using LEO intercept. Hacked police email accounts are used to gain access to carrier systems where they use "imminent threat" no warrant lookups to pull the SMS in real time.

SMS is a terrible form of 2FA, better than none but not by much.

[–] damium 13 points 11 months ago

Your experience may depend on which distro you use and how you install things. If you use a distro with a stable upgrade path such as Debian and stick to system packages there should be almost no issues with upgrades. If you use external installers or install from source you may experience issues depending on how the installer works.

For anything complex these days I'd recommend going with containers that way the application and the OS can be upgraded independently. It also makes producing a working copy of your production system for testing a trivial task.

view more: ‹ prev next ›