![](https://lemmy.blahaj.zone/pictrs/image/7yBccNRuwS.png)
![](https://lemmy.dbzer0.com/pictrs/image/a18b0c69-23c9-4b2a-b8e0-3aca0172390d.png)
Btw this is most likely a scam. This is the equivalent of asking for your name, DOB, and SSN on a random app you found (the ID contains both location and DOB). Even if you have an actual ID DO NOT FILL THIS OUT. Delete, purge, and move on.
Btw this is most likely a scam. This is the equivalent of asking for your name, DOB, and SSN on a random app you found (the ID contains both location and DOB). Even if you have an actual ID DO NOT FILL THIS OUT. Delete, purge, and move on.
Also if the router blocks icmp for some reason you can always manually send an ARP request and check the response latency.
Is there a specific reason you’re looking at shadowsocks? The original developer has been MIA for years. People who used it in the past largely consider it insecure for its original stated purpose
trojan-gfw is a better modern replacement. However that requires a certificate in order to work. You can easily get one via lets encrypt.
At this point, let Shadowsocks, obfs, and kcp die a graceful death like GoAgent before it did.
deleted by creator
Another thing you can look into is apptainer/singularity. Basically portable container binaries. Executing the binary automatically runs a program/drops you into a shell inside the container with your $HOME mounted inside. Stuff like cuda also work as long as your host system has appropriate drivers.
You can also port docker containers to apptainer directly via cli.
Oh wow. It supports Kobos as well. Gonna have to check this out. Thanks.
Just in time to move to IPv6!
What someone does with their 16,777,215 IPv4 addresses is none of our business…
Now just connect all of that with L2 switches and watch those ARPs fly!
Can’t comment much about the docker side since it’s not something I’m familiar with.
For the kernel part, assuming what you’re referring to as UUIDs is the pid namespace mechanism, I’m failing to see how that would add overhead with containers. The namespace lookups/permission checks are performed regardless of whether the process is in a container or not. There is no fast path for non-containerized processes. The worst overhead that this could add is probably one extra ptr chase in the namespace linked list.
Make sure to test your setup if you are using DAV. Large files can fail if your nextcloud setup is done incorrectly.
Source: idiot who misconfigured PHP that resulted in a DAV client stuck in a retry loop, then getting banned by my own firewall for DoS.
Isn’t the whole point of these things the “bloated” (CI/CD, issue tracker, merge requests, mirroring, etc) part? Otherwise we’d all be using bare git repos over ssh (which works great btw!)
It’s like complaining about IDE bloat while not using a text editor. Or complaining there’s too many knives in a knife set instead of buying just the chef knife.
I’m not familiar with the topic but couldn’t they cut straight to the source and directly contact Corning? Or alternatively, one of those Chinese high end OLED knock offs? I’ve heard they’re basically less than 1 generation apart in terms of quality.
edit: alternatively, I assume all cables/connectors are standard. What’s preventing Jim next door from starting a group buy to manufacture replacement OLED screens/upgrade kits?
And I did the same as a kid in the late 2000s in order to play World of Warcraft. Found someone’s info on a random online dump, filled it in and didn’t think more about the id theft. What I then learned is that there is NO “fake” IDs that can pass this test. It’s just plain old ID theft of actual people.
The ID itself is encoded as 3-digit city/3-digit district/8-digit dob/and 4 random digits. There is no “generated” name that works with a specific ID since the name isn’t encoded anywhere. Most reputable vendors perform the check backed by an actual government DB.
The problem is that it IS the exact same info used to apply for bank accounts, loans, mobile phone numbers, etc. And nobody bats an eye when a pirated gaming app asks for it. This could be legitimate, but I’m more willing to say this is someone’s ID collection scheme. If that’s the case, it could be doing more than just collecting IDs (cause why not?) or it’s at least facilitating more ID theft.