@schnurrito@discuss.tchncs.de why on earth would you use a title like that? It‘s just plain wrong. The project switched to a different license. It is still free and still open source.
@schnurrito@discuss.tchncs.de why on earth would you use a title like that? It‘s just plain wrong. The project switched to a different license. It is still free and still open source.
I am Swiss and member of the other big organization which helps people die. Not because I want to die, but I think it is every persons basic right to decide, when their life should end.
Since you do not work with a hermetically sealed environment, it is totally enough to use duct tape to bridge different hoses. The goal is to have a steady stream of nitrogen which you can breathe for at least 60 minutes. Not that you need this long to die, but in cases like this, I would add 3-4 times the amount of safety, so you are clearly dead and not just a veggie in a coma.
This. So don’t just put a bag over your head. The CO2 buildup will make you feel how you suffocate. Just order a gas mask like thing (hardware store, medical suppplier, scuba gear,…) and make it so you breathe nitrogen, but exhale the used air to the atmosphere.
Is this the only point, when it comes to security? In my experience, the ease of use is also a factor. Today, VPN clients are just one button and it runs. I2P is almost there, but requires you to setup some configs manually. So is it really worth to drive a tank to just go grocery shopping?
Tomorrow passwords will be cracked in no time, because most algorithms are not quantum safe. Same with password length.
I never said it is not an attack vector. There are dozens if not hundreds. The question is about the probability, which is always a dimension if you manage risks. There is no need to list all theoretical possible attack vectors, if the probability of actually happening only affects 2 people on this planet.
Videos for educational purposes should not sensationalize unlikely attacks, as it only causes unnecessary fear. I’d rather have someone using torrent on VPN than not using anything at all because they are now afraid of the government.
That’s not what I was talking about?
If someone is actually trying to convict you just based on the correlation of the connection times, you probably don’t just share a copyrighted movie. So why mentioning this as an actual threat in the first place?
Nice boob job
Quite simple: plain, small, pierced boobs! Thanks for sharing! You are awesome.
says it is first full frontal
does not post full frontal
system32 is legacy crap anyways and is not used anymore. Everything important is stored in system64
Nope nope nope
By the way OP, similar but worse is the ability to handle 25Gbits. But someone made a working router for that as well and CPU was also a factor: https://michael.stapelberg.ch/posts/2022-04-23-fiber7-25gbit-upgrade/
True. But since OP is using a benchmark anyways, I don‘t know how close to real world that is. If they are doing lots of filesharing, let‘s say with P2P networks, it could be way worse because of the number of connections. So I agree with you - I was just working with the info I had :)
And he is currently at 1/3 of the potential speed and 3*60% = 180% CPU load for 1Gbits. So I wouldn’t even bother troubleshooting further when you already know the hardware will be an issue sooner or later.
The question is what you do with your pfsense. IDS/IPS are quite CPU hungry and Celerons are not really fast CPU’s.
DNS? Why so complicated? Just edit your hosts file 😏
It looks nice, but honestly, once I set up everything (which I do on each of the *arr anyways), there is nothing left to be managed. That‘s the whole point of this setup, to get rid of managing things manually.
So even if I love that project and am very appreciative for all the work, I don’t have any use case in my setup that would want me to use this.