As ready as they’ll ever be, which probably isn’t all that ready in absolute terms…
Some dingbat that occasionally builds neat stuff without breaking others. The person running this public-but-not-promoted instance because reasons.
As ready as they’ll ever be, which probably isn’t all that ready in absolute terms…
So pretty much one of those smart speaker things with a pin on it, for hundreds of $$$ and a subscription to boot? What a great idea…
I’ve never heard of this thing, is it supposed to do what the analyze this picture or ID the song playing features of my phone already could do, or is there something novel I’m missing?
A vote is a vote, but that’s not the solution I spoke of. Rather than trying to push people to disengage or vote 3rd party, neither of which will make any meaningful difference to the situation (even in the million to one chance some 3rd party did get elected, they’re a politician and will do politician things), why not take the situation into your own hands and create the company run by someone who won’t behave like a capitalist?
Create the next Google, but you can be the one who really follows the “don’t be evil” mantra and in the process usurp the throne from the capitalists who have gone wrong. Once that is done you have the ability to simply hand the reigns over to anyone working there and walk away knowing the problem of that particular market is now solved.
The amusing thing about the people who complain that capitalists are the root of all problems, they don’t make an effort to correct it.
Take the situation of this story. If your ideals are pure and would have the popular support of a critical mass of people, there is absolutely not one thing preventing the establishment of a company, chartered as a public good corporation, and ran as a non-profit entity to provide these kind of material goods for people at cost, or if someone is willing to subsidise the production even less so if you like. You could even get the seed money from a crowd sourced campaign, or so called ‘angel investors’ no strings attached, no ownership stakes to distribute.
Oh come on, you think some would do that? Go in the internet and tell lies?
I mean it is or at least should be a policy on most sites already, it’ll be nice to have some teeth beyond banning their accounts though.
If they’re already giving exclusive access to Google for search and AI training, my bet is it’s all in a bid for ‘please buy us daddy Google’, and let them handle it from there.
After all, they wouldn’t want anyone to call them out on continuing chicanery during such a trivial event as their home country’s presidential election cycle…
Who is surprised here, raise your object manipulation attachment, er, hand…
Yet I see those same posts screen-shot and posted here as though they was reliable news sources.
I have to wonder, how hard would it actually be to set up one of these ‘luxury’ brand names with 1000% markups and use it to Robin Hood the crap out of a bunch of people with too much money. Pay for the local school renovation via profits off some of those people too high on their own farts to notice those around them.
They’re a part of the mix. Firewalls, Proxies, WAF (often built into a proxy), IPS, AV, and whatever intelligence systems one may like work together to do their tasks. Visibility of traffic is important as well as the management burden being low enough. I used to have to manually log into several boxes on a regular basis to update software, certs, and configs, now a majority of that is automated and I just get an email to schedule a restart if needed.
A reverse proxy can be a lot more than just host based routing though. Take something like a Bluecoat or F5 and look at the options on it. Now you might say it’s not a proxy then because it does X/Y/Z but at the heart of things creating that bridged intercept for the traffic is still the core functionality.
It depends on what your level of confidence and paranoia is. Things on the Internet get scanned constantly, I actually get routine reports from one of them that I noticed in the logs and hit them up via an associated website. Just take it as an expected that someone out there is going to try and see if admin/password gets into some login screen if it’s facing the web.
For the most part, so long as you keep things updated and use reputable and maintained software for your system the larger risk is going to come from someone clicking a link in the wrong email than from someone haxxoring in from the public internet.
I have a dozen services running on a myriad of ports. My reverse proxy setup allows me to map hostnames to those services and expose only 80/443 to the web, plus the fact that an entity needs to know a hostname now instead of just an exposed port. IPS signatures can help identify abstract hostname scans and the proxy can be configured to permit only designated sources. Reverse proxies also commonly get used to allow for SSL offloading to permit clear text observation of traffic between the proxy and the backing host. Plenty of other use cases for them out there too, don’t think of it as some one trick off/on access gateway tool
A deadline set by a government agency for government workers, NOT a ‘Google Pixel Deadline’. Stop writing alarmist headlines to make it sound like Google is gonna shut off your phone if you don’t comply. You should update, but knock this writing style off people.
Zabbix or Cacti are nice ways to draw maps that also serve a functional role in keeping track of the activity and alerting.
Looks like was just updated today pending transfer, so either the owner transferring registrars or someone took it over.
https://www.whois.com/whois/funkwhale.audio
Domain expired on the 19th, so it’s validly offline. Has always seemed to be a low-adoptiom platform, will have to see the status in the next few days.
I’m fairly sure if they took porn off the internet, there’d only be one website left, and it’d be called “Bring Back the Porn!”
Makes sense, I’m so accustomed to making virtual machines and such that it becomes just a thing but inevitably at some point admin access was required to create the hypervisor, the vnic, a virtual switch, etc. Without that restriction a piece of malware could readily exfiltrate data past a local protection by just making it’s own new pathway through on the fly or any number of other unpleasant things.
They claim $100 B in ‘losses’ to this kind of game. Unless they’re actually running red on their books what they really mean is ‘we think we should make at least $100 B more per year’.
I’m sure that the vast majority of that would go directly to the front of house employees they’re pinning this on too, definitely not to the execs and share holders…