Yy3568 has most if not all of that, sata also and thats hard to find.
Yy3568 has most if not all of that, sata also and thats hard to find.
Also, you can back up your dB to encrypted json and restore it later.
You only need 2 pairs for 100base-t, try forcing a lower negotiation, see if the pairs you need work? Maybe unbundle the other set of pairs and try them?
Disney is an absolute must if you have a kid, and a great value besides.
Otherwise it makes 0 sense except for maybe star wars sometimes.
Let me clarify:
Recordsize is basically hash block size. If you want to change things you will always write in blocks up to the recordsize, smaller if the file is smaller, then calculate the hash based on that.
Smaller only helps for randomish accesses inside a file.
I’m really curious if that’s still true for debian 12, it’s using a 6.1 kernel and stuff isn’t nearly as old.
Yup, TC was weakened, and so far not powerful enough to hurt, but it’s still a threat.
DRM is everywhere in some form or another, again usually not strong enough to stop determined attackers but enough to create a barrier that, one that can be raised as needed in an “emergency”.
My udm is basically running either debian or Ubuntu with all the major apt packages so everything should work, though I don’t think most of the logs go through syslog, many go into their mongodb database I think.
Not Sure Actually.
Agreed, though recommend nginx as proxy, have it do ssl, can set it up with letsencrypt, but mostly you can run multiple services off multiple internal hosts as subdirectories (assuming they cooperate).
Works great for me.
Probably not, look into wireguard or tailscale.
I was fine till I hit sussin.
So in the end, it doesn’t even matter?
That was so much more fun than it had any right to be.
Lvm can get you 80% of the way to basic zfs. I’m a bit similar, old school Unix who likes debian because it makes sense, but storage is one of my dominating constraints so zfs is mandatory (even if I hate stuff like the way the arc works by default).
Have an alias so trusted hosts can bounce through my authorization host and end up on a tmux session on the targetted host. It has logging and such but mostly it’s for simplicity.
If I plan to use that connection a lot there’s a script to cat my priv key through the relay.
Have an scp alias too, but that gets more complicated.
For more sensitive systems I have 2fa from gauth set up, works great.
You got that baby? Great, I’ll send the next 500 much faster, tell me when you drop one and I’ll slow down again.
You have a problem with agile methodology, you have a problem with me, and I suggest you let that one marinate.
Imagine being able to autocomplete months.
Oh yeah, it’s a 3588, all out of tree, I’m very similar.