I don’t use Ubuntu personally, but it was great to automate for deployment in a corporate setting.
Yes, Debian has some agnostic unattended install, but writing basically cloud-init is just so much better.
Your first amendment protects you from the government. It does not protect you from actions taken by companies or other people based on your speech.
Can you ping server 1 from the subnet router?
Make sure to check if you have a firewall blocking ICMP packets on server 1 or somewhere between.
Maybe run traceroute from both serves and compare the route taken and where it stops.
Sadly we lost that fight to the other centralised platform in Bluesky
Why is this so heavily disliked?
Yes, but that’s what you would need to do and get if everyone had to install an intermediate cert.
Not really, because the client system is configured to go through the proxy. That proxy will connect to the website and do filtering on the unencrypted content because it is initiating the connection. Next it’ll re-encrypt everything with its own certificate and serve it to the client.
From having worked in an enterprise environment, there’s a chunk of websites that break when you intercept their SSL connection.
Nextcloud News with the accompanying app on my phone. I was lazy that day
I’m guessing this is just a Vulkan interface to access the built in hardware encoder/decoder block.
Awesome post, though I only got like 5% of it
Works with Wayland btw, though still experimental
Install Firefox and download uBlock Origin
It was a rare w for the YouTube algorithm. Didn’t know that guy beforehand.
Fwiw both GamersNexus and HardwareUnboxed also posted positive reviews.
Can you ping the server through your tunnel? Maybe try a traceroute to see if it gets through your router correctly.
If this does work, check if the arrs have some “restrict to local network” setting.
If not, I’d check the firewall logs on your router to see if it is blocking the connection.
If their claims are true, I’d say this is a decent upgrade from my RX 6600 XT and I’m very likely buying one.
The .mobi was a previous post where they bought the expired domain which was previously used by the .mobi WHOIS server.
A bunch of systems apparently didn’t update their WHOIS database and still tried to get WHOIS information from the old domain.
This could lead to RCE in some implementations if they provided a malicious response.
A bunch of CAs also accessed the old domain and use WHOIS to verify domain ownership. By setting their own email address for verification, they could have issued themselves a certificate for any .mobi domain (microsoft.mobi, google.mobi for examle).
Now to this article, here they looked at a bunch of webshells with backdoors added by the developers. Some of the domains had expired, so by getting those domains and setting up a webserver they got connections from different systems infected by the malware. They could have used the same backdoor previously used by the devs to access those same systems remotely and do whatever.