

Seems like Doge might have been setup to facilitate this. They are cross referencing data from the HHS database. Big Brother.


Seems like Doge might have been setup to facilitate this. They are cross referencing data from the HHS database. Big Brother.
Exactly on point about html and WWW being a better representation for the beginning of what people consider the birth of the internet.
While precursors might have existed before this song released, most wouldn’t consider the internet existing before there were commercial options. These didn’t start to manifest until the internet protocol suite was released as open source in 1989 and commercial ISPs started selling access.


It’s always DNS


I mean, solder melts at temperatures lower than 300 degrees Celsius.


You are just trolling right?


Thank you. This isn’t a fair use case. They aren’t making a statement parodying anyone. They aren’t using it to report news, teach, or research anything. I would also think fair use laws would prohibit uses that harm the value of the copyrighted work.


Don’t forget his ex-wife is now shagging Don Jr.
Marines and soldiers, don’t let them use a partially incorrect fact to attack you.


Also it would be libel, not slander anyways.


A jump host is just a system that serves as an exit point into the restricted network. You can do this with Ubuntu desktop but you need to figure out how you are going to jump into your host. Others have mentioned tail scale and head scale as options for doing this. Tailscale would be an example of an agent based adhoc vpn solution; this would place a dependency on an external provider to host a connection broker service and use an agent that periodically checks into the broker service for connection requests. Headscale would be the self hosted option and you would need to forward a port into your network and you should guard it with a reverse proxy.


Good point about network availability and endpoints.


Since I have no patience, I’ll lay out some items for consideration.
1st, I wouldn’t rely on an ISP router to serve as my end point for a VPN. They likely have access to manage that device and it likely isn’t getting any updates. You are better off implementing it with your own equipment that you keep updated.
If you have a capable security device serving as your router to the external internet and you want full access to your internal network, then you might consider using a VPN that terminates at your router.
I myself am a fan of setting up a jump host and initiating a VPN connection directly to that host when using an agent based solution. Then you can monitor the host for activities, more easily keep your edge device patched, and then use the capabilities of your jump host to interact with the rest of your network. This would require either an agent to periodically poll a platform for connection requests or another form of ingress into your network.


Expand on your use case. Why/what do want to access on your local network when you are not there?
deleted by creator


Omg, I agree. I hate seeing the same article posted to 10 different instances all lined up in a row.


More than 5 posts would raise the likelihood of people blocking that instance because of spam. Less is more.


It sounds like you are looking for a server that is ripe for bot abuse. What time frame did the admin say not more than 5 posts. I would tend to think they mean 5 posts a day which sounds completely reasonable to be for an upper limit on posts per day into a single sub.


Hmm interesting to learn, thank you for sharing. I still contend that it shouldn’t be coward going to coward. It should be a verb for the last word as it is in Haters going to Hate. I am not familiar with coward being used as a verb.
This is one of our most frustrating fights I have with our security design reviewers. Effectively functionless mitigations that create extra obstacles for our service reps to deal with during troubleshooting. One example is our equipment is installed in access restricted areas, in a locked rack. We don’t need to disable unused Ethernet ports on our networking equipment that exists in a locked cabinet and it will take away our ability to repatch equipment to a different switch in the system to assist in troubleshooting.