

I read on something else that a second craft landed safely.


I read on something else that a second craft landed safely.
I work for an ISP and did a migration that involved me seeing SSIDs we backed up. The FBI has hundreds of surveillance vans according to that.
I love this sabotage. Has this worked against anyone that you know of yet?


I use Frigate and HomeAssistant, they are on different hosts and the only port allowed from Frigate to HomeAssistant is the non-auth api port. For normal users using Frigate, I use an Oauth2-proxy instance on the same host (same compose) as Frigate tied to a third host with keycloak. go2rtc is on the Frigate host, but it only talks to Frigate and the cameras themselves. You can also access go2rtc from outside if you want to access the streams directly but your HomeAssistant does not need too. I find that this is better than the cameras directly as the processing is not really meant for a whole bunch of streams at once.
I followed docs for the HomeAssistant to Frigate stuff with the GIF notifications and it is working fine. I also use the Frigate integration (using HACS) so maybe there is a lot done for me.


They note in the article that all “concessions” were already planned to be implemented. They really didn’t do anything other than give a list of what they already planned to do.


all his companies are slowly becoming one - spacex is taking over xa"i" which already owns shitter
maybe starlink is somewhere in the middle or just separately owned by spacex
means you can’t get one without all, but there is a bright side of shitter and the elon regurgitater can just be shut off once it’s taken over


journalists never are experts, with some rare exceptions


red flag imo. especially when it comes to fork trucks and safety implications it shouldn’t be a big deal to call a mechanic to check and ensure they are in proper working order.


check your library! a lot are adding maker spaces. My local library has a couple 3D printers, laser cutter/engraver, cnc vinyl cutters and all sorts of handheld implements.


it doesn’t matter, our insurance company has more strict requirements. all it ever is for FCC, CISA, NIST, etc is someone “attesting” that we meet requirements


let’s take an entry level hobby electronics activity and do our best not to learn anything by using chatgpt??? what’s the point??


thank you! not a new form factor just cloth covered now
It is considered a fail, and then inputting passwords in the form is a super fail.
we do monthly phishing tests and some of our people are so bad that we put in the test email “this is a phishing email, do not click sign in” above and below the sign in box and they still give creds


What I am personally curious to see is if this was ever completed:
a waiver from Pendleton’s Range Operations Division — call sign LONGRIFLE
It seems they had a form waiver, that likely would include risk assessment. The article later stated that the military appeared to be following procedures outlined in the waiver/by the Range Operations Division, specifically when all firing ceased and a root cause analysis launched after the premature detonation.


I have multiple linux computers, from servers to a surface tablet, i am able to use all different generations of all nvidia, both permanently installed, and eGPU. It is not without any issue, but it works and is usable.
For me issues stem from x11 vs wayland (work computer is ubuntu due to company policy), or egpu shenanigans which I feel is platform agnostic


working for an isp in rural NY and PA, this is not uncommon, but for us normally they are normally not “stray”
Every hardware based key I ever used also required PIN, but as far as expense and backups, yes, for personal use the cost generally may not be justified. I got all my personal ones as a bundle that was on sale. For work I would argue that some businesses can easily justify the cost to create a rotating stock of hardware keys to deal with lost keys. Generally in that environment you have centralized PKI, where you can revoke the certificate on the lost key and then issue a new certificate on a new hardware key. This doesn’t help for all sign in methods tied to hardware keys, but can be very practical when implemented right.
I also agree on TOTP as the ultimate generic 2FA method, with several worsening options until the despised email or sms 2FA. I will also add that you can setup TOTP on modern hardware keys, where you must insert and complete PIN entry. The inconvenience is that you must have all your keys and password manager available at setup time for places that don’t support multiple TOTP codes.