Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CA
Posts
3
Comments
1,570
Joined
2 yr. ago

  • Where you fucked up:

    passenger 2 - "Hey guys, I have a liferaft over here that doesn't have a hole in it."

    You can’t reach the other one with no holes.

    One of 2 things is happening with this comment.

    1. You actually don’t know how FPTP voting works.
    2. You’re pretending to not know how FPTP voting works.
  • It’s like you didn’t even read what I wrote.

    It’s NOT uniquely stupid. Dummies vote against their interests all the time (see comment about white Christians).

    And it doesn’t take any special enlightenment to acknowledge how FPTP voting works. In fact, it’s so simple, you’d have to be pretty stupid to be unaware.

    But keep ruining that word to the point of meaninglessness.

  • restic -> Wasabi, automated with shell script and cron. Uses an include list to tell it what paths to back up.

    Script has Pushover credentials to send me backup alerts. Parses restic log to tell me how much was backed up, removed, success/failure of backup, and current repo size.

    To be added: a periodic restore of a random file to have its hash compared to the current version of the file (will happen right after backup, unlikely to have changed in my workload), which will be subsequently deleted, and alert sent letting me know how the restore test went.

  • Permanently Deleted

    Jump
  • Not saying it’s a good reason for pulling back or not deploying troops but, that would certainly “confirm” these idiots fears of “tha gubmint” coming for their guns.

  • The basic flow of the attack is, first, infecting an Internet-connected device through a means ESET and Kaspersky have been unable to determine. Next, the infected computer infects any external drives that get inserted. When the infected drive is plugged into an air-gapped system, it collects and stores data of interest. Last, when the drive is inserted into the Internet-connected device, the data is transferred to an attacker-controlled server.

    Guys, storage devices move data from one machine to another. /pikachuface