TLS doesn’t encrypt the host name of the urls you are visiting and DNS traffic is insanely easy to sniff even if you aren’t using your ISPs service.
TLS doesn’t encrypt the host name of the urls you are visiting and DNS traffic is insanely easy to sniff even if you aren’t using your ISPs service.
it literally explains what they’re for in the product listing:
These labels aid your warehouse operations.
• Categorize inventory, reorder points, product dating or special instructions.
• Apply these labels to pallets, boxes and shelves for easy identification.
• Easy to write on.
you understand there’s more than one way to have an economy right? that there’s more than one way for labor to be rewarded for its output?
saying “our economic system needs to end” has nothing to do with what you wrote
SMS is literally the bottom of the barrel though
I’m really curious what kind of media you’re consuming that would lead you to believe Hamas exists as this highly organized entity with a website and charter. Like what, do you think there’s a CEO of Hamas that has drafted a new mission statement following the recent events?
Hamas, like all “terrorist” groups, exists as a much more patchwork and organic group of individuals than the shady well organized cabal most media would have you believe. Just another form of the propaganda machine putting in the work to get the people all juiced up for military intervention.
assuming you have a GNU toolchain you can use the find
command like so:
find . -type f -executable -exec sh -c '
case $( file "$1" ) in (*Bourne-Again*) exit 0; esac
exit 1' sh {} \; -print0 | xargs -0 -I{} cp {} target/
This first finds all executable files in the current directory (change the “.” arg in find to search other dirs), uses the file
command to test if it’s a bash file, and if it is, pipes the file name to xargs
which calls cp
on each file.
note: if “target” is inside the search directory you’ll get output from cp
that it skipped copying identical files. this is because find
will find them a free you copy them so be careful!
note 2: this doesn’t preserve the directory structure of the files, so if your scripts are nested and might have duplicate names, you’ll get errors.
why use docker here? you’re just adding layers of abstraction in an environment that can’t seem to really support them.
that said, switching to 32bit linux, if the VPS supports it, will save you memory.
no, and that’s be a pretty bad idea, you’re opening up all your internal hosts to the public internet.
a VPN is specifically designed to keep all your internal hosts off the public internet. When you authenticate with the VPN server the remote device you are using effectively “joins” the internal network, using the VPN to act like a tunnel between you and your network.
it has the benefits of better security as well as the fact that once you set it up, you can access any services you host, not just HTTP ones.
don’t forget that the new CEO, hired to bring advertisers back, has a non-compete clause preventing her from working with advertisers
if you’re talking about that recent pic of him floating around with a chain and a bread, that was an AI doctored photo