Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)NO
Posts
7
Comments
474
Joined
2 yr. ago

  • Great movie. Where was “story time” in The Birdcage? As I say that I have to wonder about any bad faith in OP’s shower thought considering Mrs. Doubtfire was rightly pointed out as crossdressing and not drag queen.

  • FYI docker engine can use different runtimes and there is are lightweight vm runtimes like kata or firecracker. I hope one day docker will default with that technology as it would be better for the overall security of containers.

    • Exchange 2000 Conferencing
    • Windows Messenger 5.0 (Live Communications Server 2003)
    • Windows Messenger 5.1 and Microsoft Office Communicator 2005 (Live Communications Server 2005)
    • Office Communicator 2007
    • Office Communicator 2007 R2
    • Lync 2010
    • Lync 2013
    • Skype for Businesses 2015
    • Skype for Businesses 2016
    • Skype for Businesses 2019
    • Skype for Business for Microsoft 365

    Thanks Wikipedia, no way I could have remembered them all. Although I feel like Lync 2010 might be Lync for Business 2010?

  • That’s a very strict interpretation of the community rules. My interpretation is anything Linux-related, which reads Linix-based distro related, i.e. software that runs on linux operating systems. Kernel discussions are niche enough that you should start a new community called linuxkernel imo.

  • I agree with what you’re saying, but all software is insecure and it should be up to the user what their risk tolerance is. Instead, users’ control of their equipment is whittled down and before long the only choice will be deal with it or don’t play. Pinephone comes to mind as a phone with root access that is somewhat secure, but it also has latent vulnerabilities that could be exploited as its version of sudo is also an attack vector. Everything is a trade off especially in software/tech.

  • That goes for unrooted phones as well. The danger with rooting a phone comes from the automated software that is doing the initial rooting. It could install anything in there and the user would be none the wiser. Once it’s rooted and permissions are requested via the superuser app, it’s not any more dangerous than a non-rooted phone, assuming nothing malicious was installed during the rooting process, that is.

  • I have mixed architecture cluster as well. It works great as long as you set your manifests up properly and either use public images that support both or you build your own, or you set up node affinity to ensure the architecture-specific pod runs only on the node with the correct architecture.

  • Install tailscale and k3s on the master node and worker nodes. I have a setup like this and it works well. I have nodes in different physical locations from the master node, it works fine.