Rob Thomson skated across the US starting in 2006. Also from Switzerland to China.
I have a photo from that trip handing up poster size in my house. A random waterfall panorama.
Rob Thomson skated across the US starting in 2006. Also from Switzerland to China.
I have a photo from that trip handing up poster size in my house. A random waterfall panorama.
Yes, particularly the variant distributed on a business-card sized CD rom. To be carried in your wallet for emergency use.
Why not chest-mounted?
So we have learned their plan ton pay for those 38% pay raises.
At one time there were browser extensions that allowed you to comment on any web page and allowed other extension users to see your comments.
The comments were hosted through the extension and not on the pages themselves.
Something like that would be possible but I don’t know anyone offering it now. I presume no one wants to moderate that.
I had a friend who liked to sulk around in a trench coat. He bought a grocery store donut and promptly tossed the receipt.
He was soon stopped by grocery security for theft. After some hassle they tracked down his receipt and let him go, but yeah that’s what donut receipts are for.
This coverage provides an example of what is sent, and it includes neither MACs nor HDD serial numbers.
After Ubuntu for many years I switched to Arch because they packaged a number of things I wanted that Ubuntu did not.
If you are happy with Ubuntu stick with that. I have friends and family that use it and it’s fine.
Good example. It’s true that an even a GET request not designed to mutate data might still fail to validate input, allowing a SQL injection attack or other attack that escalates to the privileges that the running app has.
This has to be the cheapest coiled split-keyboard cable option. Creative !
Immich has a whole set of end-to-end automated tests to ensure they don’t accidentally make public any URLs they went to be private:
https://github.com/immich-app/immich/tree/main/e2e/src/api/specs
As a popular open source project, that would be e glaring security hole.
Using this proxy puts the trust in a far less popular project with fewer eyeballs on it, and introduces new risks that the author’s Github account is hacked or there’s vulnerability in he supply chain of this docker container.
It’s also not true that you “never need to touch it again” . It’s based on Node whose security update expire every two years. New image should be built at least every two years to keep to update with the latest Node security updates, which have often been in their HTTP/HTTPS protocol implementations, so they affect a range of Node apps directly exposed to the internet.
Yes, there are broken uses of the HTTP protocol verbs where filtering to GET won’t work.
A simpler way to protect a private service with a reverse proxy is to only forward HTTP GET requests and only for specific paths.
It’s extremely difficult to attack a service with only GET requests.
The security of which URLS are accessible without authentication would be up to immich.
Some kind of horizontal deflection — a curve to the side can still be used to slow bikes near an intersection. But here the original design practically required getting off the bike to go through it, while the path around it will hardly slow bikes at all. So both attempts were failures.
Here’s example of a newly constructed protected bike lane which curves as it approaches an intersection to slow bike traffic.
I think you may be looking for a programmable keyboard.
With one, you can have arrow keys on the home row like vim, and make other universally recognized keys easy to reach including Home, End, PgUp, PgDn, App (right click), and all the modifiers. Some also build pointing devices into the keyboard as well.
I primarily use the Unicorne by Boardsource.
That’s something! But it doesn’t raise any money from people with other VPN providers or who don’t want to buy a VPN service.
If you are referring to Beth Rosenbarger, she took a job with a different employer some time ago.
The mayor’s appointment to the historic preservation commission had no experience with historic preservation. The appointment did not get the motion and second required to bring it up for a vote.
Counterpoint: for those who prefer split ergo keyboards, the internal keyboard on laptops is rarely used.
A tablet where you can bring your own weird keyboard to pair with it is better.
A content management system admin? Painful.