Sunken cost fallacy maybe.
For anything important, use matrix instead of lemmy DMs.
Sunken cost fallacy maybe.
Edit the sudoers file.
## user is allowed to execute halt and reboot
whateverusername ALL=NOPASSWD: /sbin/halt, sbin/reboot, /sbin/poweroff
I still have the Ctrl key on hackers keyboard in portrait mode?
I can’t find that email in the pending accounts, if you can confirm me the username of the account.
Thanks
I’ll take a look, thanks
Yea but I didn’t realize the vaultwarden project didn’t also release client software.
I had looked into running my own vaultwarden, but without open source clients it’s maybe a bit moot. Although I guess the web interface can be considered a client, OS or browser integration is a convenient feature.
Vaultwarden ?
Edit: Nvm, that’s just the server part
Automating prejudice.
Yea I miss the hardware fingerprint reader that was on my last one. The under screen reader is much slower and less reliable.
Bread and games.
Entertainment is a huge market.
The problem is there’s likely not a universal solution that’s guaranteed to clean everything in every case.
Cleaning specific logs/configs is much easier when you know what you’re dealing with.
Something like anonymizing a Cisco router config is easy enough because it folllows a known format that you can parse and clean.
Building a tool to anonymize some random logs from a specific software is one thing, anonymizing all logs from any software is unlikely.
Either way, it should always be double-checked and tailored to what’s being logged.
It depends a lot on what the application is logging to begin with.
If a project prints passwords in logs, consider to just GTFO as it’s terrible security practice.
There might also be sensitive info that’s not coming from a static thing like your username, but from variable data such as IP addresses, gps coordinates, or whatever thing gets logged.
Meaning a simple find&replace might be insufficient.
When possible, I tend to replace the info I remove with a short name of what I replaced out as it’s easier to understand context when it’s not all **********
or truncated.
example:
proxy_container_1 | <redacted_client1_ip> - - [17/Aug/2024:12:39:06 +0000] "GET /u/<redacted_local_user2> HTTP/1.1" 200 963 "-" "Lemmy/0.19.4; +<redacted_remote_instance3_fqdn>"
keeping the same placeholders for subsequent substitutions helps because if everything is the same, then you don’t know what’s what anymore.
(this single line would be easy enough either way, but if you have a bunch and can’t tell client1 from client50 apart anymore that can hinder troubleshooting.
regular expressions are useful in doing that, but something that works on a specific set of logs might miss sensitive info in another.
I’m sure people have made tools to help with that, possibly with regex patterns for common stuff, but even with that, you’d need to doublecheck the output to be 100% sure.
It helps a lot when whatever app doesn’t log too much sensitive info to begin with, but that’s usually out of your hands as a user.
Haven’t had to use port forwarding for gaming in like 30 or so years, so I just looked up Nintendo’s website…
Within the port range, enter the starting port and the ending port to forward. For the Nintendo Switch console, this is port 1024 through 65535
LMAO, no thanks, that’s not happening.
For your question, you could likely route everything through a tunnel and manage the port forwarding on the other end of the tunnel.
I haven’t played TF2 in a while (before f2p?), my understanding is that community servers were mostly fine and how we’re mostly on random casual games?
At least this game has a dedicated server option, contrary to the other TF2.
mTLS is great and it’s a shame Firefox mobile still doesn’t support it.