

I just did that on my own laptop, trying to figure out why it was running like crap. Turns out I set it to quiet mode instead of cool, so it underclocked instead of running the fan
I just did that on my own laptop, trying to figure out why it was running like crap. Turns out I set it to quiet mode instead of cool, so it underclocked instead of running the fan
It will know as much data as it would for any other wireless client. MAC address mostly.
I bought a new one recently. Apparently they’re doing a subscription thing now, so look closely at which model you’re buying. But other than that, it works just the same as my old one.
I’m not exactly sure what you’re trying to do here. Yes, if you use a phone as a hotspot, everything going through will be associated with that hotspot phone’s IMEI.
Yup, it works great. I actually did it myself when migrating from a centos to debian host. Worked first try, no issues (except one thing that was already broken but I didn’t know because I hadn’t accessed it recently). Containers are great for this.
This. Cloud-init, or autoinstall for Ubuntu, to get the install done, then use ansible for anything more.
I don’t have a specific recommendation, but you can look over the big list maintained by Reddit users: https://docs.google.com/spreadsheets/d/1ijfqfLrJWLUVBfJZ_YalVpstWsjw-JGzkvMd6u2jqEk/edit
You probably want one hosted in a non-cooperative country, and one that doesn’t keep logs.
Bind mounts. I’ve never bothered to figure out named volumes, since I often work with the contents outside Docker. Then I just back up the whole proxmox VM. (Yes I’m aware proxmox supports containers, no I don’t plan to convert, that’s more time and effort for no meaningful gain to me.)
You can restore that backup to a new VM. I just make sure it boots and I can access the files. Turn off networking before you boot it so that it doesn’t cause conflicts.
What are you trying to accomplish by using a VPN?
Yes, but I wouldn’t bother bringing it up to them. It’s fine if they want to provide it under multiple licenses. Since they make it available under the GPL, you can do those things under that license.
If they do change something, it will probably be to change the license away from GPL.
Being a YouTube personality is enough justification for me.
Ohhh. The headline made it sound like people who get tattoos make poor decisions.
The issue is not encryption, it’s the unauthenticated API. People can interact with your server without an account.
Apparently I can’t read
Does it work if you unplug and replug? If you hit a button other than power does it wake up, or does it say “no signal” or something? Does the laptop see it? Anything in any log? Can you force a redetection from the laptop?
Loops?
The DJ is the artist. Each set is an album with one track. What’s broken about that?
Most devs are shit at their jobs.
Not that this is exclusive to devs. Most people in general are shit at their jobs.
You’ll need to check the logs for your display manager, probably kdm if you’re using KDE.
https://developer.mozilla.org/en-US/docs/Glossary/Fingerprinting
https://amiunique.org/
https://coveryourtracks.eff.org/
There are plenty of resources for this already.