![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
Yeah can confirm this will work. Similar setup great way to get wifi extended without running wires.
Yeah can confirm this will work. Similar setup great way to get wifi extended without running wires.
And the ts devs support this
Google search “Does <isp name> block port 80”
Many home ISPs block port 80 and 25. You should be able to Google that and confirm. If that’s the case you’ll have to use a different method.
Having unit and automated integration tests backed by both requirements and high code coverage. As a lead I can verify that not only you made the change to support the requirements though these unit tests but also a really quick verification that other functionality may not have changed based on your large scale change. Helps a lot for significant refactoring too
Except that isn’t the equator it’s further south
And dry
I’m surprised how much brighter tanzinia area is than south Africa
Set functionality was there leveraging object properties this just makes things more concise
This is really bad on mobile too. I usually flip to desktop mode to get to releases page quickly.
Html/css/JavaScript is one of the most highly compatible and prolific stacks to ever exist. I like to say that JavaScript has succeeded where Java was trying to be.
How many other manufacturers do they make screens for? They aren’t losing this game.
Was running on my original pi b up till I replaced it recently with a pi 4. Was a little slow but worked fine.
Is it eerie to anyone else that if I didn’t know the year this could be a characterization of Madonna the singer?
Pictures that look similar: https://upload.wikimedia.org/wikipedia/commons/thumb/7/78/MadonnaO2171023_(97_of_133)_(53269593787)_(cropped).jpg/1200px-MadonnaO2171023_(97_of_133)_(53269593787)_(cropped).jpg
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcQByVzr4BYQLxUZYc3APm8HZ6OykH7Mk6kRHQ&usqp=CAU
It’s based on security hole in what I’m interpreting as a web API. You leverage a legitimatly logged in Google account on a malicious website and this web endpoint gives you keys to everything else
Do you have some dimensions for the outlet?
They seemed to have demonstrated it on chrome and leveraged by the chrome browser but I don’t see why this couldn’t be exploited on any browser.
I setup a script to backup my lvm volumes with kopia. About to purchase some cloud storage to send it off site. Been running for a while de duplication working great. Encryption working as far as I can tell. The sync to other repo option was the main seller for me.
Curious on the implementation. For example apps like signal and WhatsApp require you to either move or lose your data when you get a new phone. This will have to be the way Google implements or they are storing it somewhere on their servers.
I guess some perspective on some other comments here. I have a dell r720xd dual xenon’s 16 total cores 128gb ram it uses roughly 200watts per hour with the 11000w power supplies. it can get fairly loud when using lots processing power. I bought a 12u rack to mount it nicely in my office. It is also my guest bedroom, while everyone we have had doesn’t mind the noise not all guests would appreciate the white noise even with many of the cpu intensive stuff turned off and it as quiet as it goes. Fans full tilt would be obnoxious and hard to concentrate.