Does NA not have insulated pins? Where a half inch of so of the pin nearest the plug head is insulated so when plugging in the exposed part of the pin is inside the hole before the pin makes contact with live power?
Does NA not have insulated pins? Where a half inch of so of the pin nearest the plug head is insulated so when plugging in the exposed part of the pin is inside the hole before the pin makes contact with live power?
But if you can taste the coke, doesn’t that mean you don’t have enough alcohol in there?
I guess my position is that I am not worried about someone confirming content exists on my server. But I don’t live in the US, if I did I might be more worried. I also geofence to my country to limit exposure.
So after I save and close a group… where do I find it?
Cheers for that. Many of these issues allow an authenticated user to do admin actions if they do the right things, so it seems you should never allow a user that you don’t fully trust to have an account.
But outside of this, there isn’t anything in there that on its own worries me given the nature of the platform (that is, that if it all burnt down I could retrieve all data from other sources). I’m no expert but a cursory look shows a bunch of potential issues that may be layered with other issues but no clear attack path except with prior knowledge.
These should obviously be fixed but there’s nothing that makes me want to rip my server off the open internet in a hurry.
What kids of things?
I’ve never worried that much because it’s not critical data and it’s containerised in Docker, but I am curious about specifics because large numbers of people expose it to the internet (through reverse proxies).
Isn’t there an assumption it would be behind a reverse proxy… At least I hope that’s the assumption.
Just reading your comment gave me arthritis.
Haha no the prongs of the first one looks good. But the handle looks too thin for my big hands. That thick fork looks like a nightmare, though.
Personally I don’t like that handle either. Needs to be thicker.
There’s a whole Wikipedia page about it. But here is the important bit:
In the past, caller ID spoofing required an advanced knowledge of telephony equipment that could be quite expensive. However, with open source software (such as Asterisk or FreeSWITCH, and almost any VoIP company), one can spoof calls with minimal costs and effort.
Some VoIP providers allow the user to configure their displayed number as part of the configuration page on the provider’s web interface. No additional software is required.
So it’s pretty trivial these days because the phone number coming from the phone network doesn’t help when the phone network lets you set whatever you like.
Unfortunately the calling party can show whatever they want for the caller number, there’s no validation that it’s true.
I recommend Findroid as well! You can download and play within the app, much closer to a netflix experience.
Whaaaaaaaat? Pivot tables are a 2 second job to summarise large amounts of transaction data or similar by month or year. Lookups or countifs would take so much longer!
Not to mention that you can drill into the data using them.
You sound like you know your LibreOffice.
My experience is they are quite different but I’ve been able to do the same things for the most part.
But how the hell do I make a pivot table that looks and functions as nice as the plain old default one in Excel?
I’m not sure what others see as the context of the meme, but in my experience it’s normally when you are fiddling with it, but you never expect it to be the problem because it seems so simple.
There are many reasons you might need to fiddle with is. The most obvious is when you move your server to a new computer, it might get a new IP address. But your browser might cache the old address. Your computer might cache it. Your DNS server might cache it (like the rest of the internet, there is not one big DNS server but many smaller ones - most non-technical people would be using one provided by their internet provider). It might not be working and you presume it’s a problem with the new server but actually it’s the DNS.
But also DNS as a system is also used for things that are not directly related to looking up a domain name. For example, when sending an email, there are many checks on the receiving side to ensure that the email is actually coming from somewhere that is allowed to send an email from that domain name. I can send an email to you from bill@microsoft.com, but it would go straight to spam because it would fail those checks. DNS records are used to authorise servers that can send email on behalf of that domain. And just generally DNS is used for proving domain ownership (for example, it’s one method to get a certificate from Let’s Encrypt to allow secure connections to your website).
When you access something on the internet, you are accessing something on someone else’s computer.
Computers have (effectively) postal addresses. When you want to access content on another computer, you type in its address.
But computer addresses don’t look like “fedia.io” they look like “123.122.1.111”.
When you type “fedia.io” your computer needs to go and ask what the computer’s address is.
That’s DNS. The Domain Name System. The system for finding the computer address from a domain name.
The above is very simplified and doesn’t cover all scenarios, but I hope it’s enough to get the idea.
Or just browse All
Ah well, it’s been the law here for 20 years.
I’m also reading about how our NZ/Australia socket was based on an American 125v socket design, later upgraded to allow 240v.
https://en.m.wikipedia.org/wiki/AS/NZS_3112