It’s not a god per se, rather the animal companion of Ganesh (Elephant god/ god of people, kinda like god Fufluns of Populonia). The mouse is like a ride of the god.
It’s not a god per se, rather the animal companion of Ganesh (Elephant god/ god of people, kinda like god Fufluns of Populonia). The mouse is like a ride of the god.
Forget gpus. A framebuffer is all you need :)
Yeah ofcourse firewall is the good idea here. I personally have firewall on on every device so that I can manage what can connect and from where.
The point is though often people just disable firewalls (some distros do not install/enable by default too) to workarround certain issues quickly like kdeconnect not connecting, bridge not working and such. That’s how I think the whole ‘ipv4 NAT is the best (consumer) firewall’ concept came popular.
Say I host a malicious server with ipv6 only. You visit the site without NAT. I get your ip and ip:631 is open (unless firewall and listen is restricted to prefix). Usual attack afterwards.
Edit: You need to have ipv6, for example many mobile networks.
ipv6 doesn’t give the NAT. A malicious website can mount the attack.
Yeah hx. It was hx that finally made me use vi style navigation and now I choose vim over nano almost always.
deleted by creator
This caption is generated by apple accessibility service? wow
I read the title and subreddit after a while and now I understand.
newpipe
ai generated lol
Afaik steam deck doesn’t have a gps module. You’ve to get any of their identifying information.
What you can do is perhaps sending memes with different cannery token redirects for each worker. Send them around when the device is being used. That way you can compare the grabbed ip with steam log and see which worker’s match. As the deck doesn’t have sim they either will use home wifi or mobile hotspot. Both will work this way.
scaled by system/themselves … looks like those are x11 apps. why is firefox into this? run it as native wayland with MOZ_ENABLE_WAYLAND
I’ve a suggestion that might work depending on how honest the perspn hiring the worker is and on their contract. You can tell the person to send some questionnaire or feedback form etc to all of them which will track their ip and name/email (say unique form per worker). Then you can match the ip, as home ips are mostly static for short duration. Tell them to send the form at night or sometime when they’ll be at home and give it a short deadline.
the bad guys use bots or services and are done. regular users have to endure while no security is added
put in other words, common users can’t easily become ‘bad guy’ ie cost of attack is higher hence lower number of script kiddies and automated attacks. You want to reduce number. These protections are nothing for bitnet owners or other high profile bad actors.
ps: recaptcha (or captcha in general) isn’t a security feature. At most it can be a safety feature.
stopping automated requests
yeah my bad. I meant too many automated requests. Both humans and bot generate spams and the issue is high influx of it. Legitimate users also use bots and by no means it’s harmful. That way you do not encounter captcha everytime you visit any google page, nor a couple of scraping scripts gets a problem. Recaptcha (or hcaptcha, say) triggers when there is high volume of request coming from same ip. Instead of blocking everyone out to protect their servers, they might allow slower requests so legitimate users face mininimal hindrance.
Most google services nowadays require accounts with stronger (like cell phone) verification so automated spam isn’t a big deal.
And what will you do if a person in a CGNAT is DoSing/scraping your site while you want others to access? IP based limiting isn’t very useful, both ways.
hCaptcha, Microsoft CAPTCHA all do the same. Can you give example of some that can’t easily be overcome just by better compute hardware?
I think a DRE with a doctorate can tell for sure.