

Seems like Doge might have been setup to facilitate this. They are cross referencing data from the HHS database. Big Brother.


Seems like Doge might have been setup to facilitate this. They are cross referencing data from the HHS database. Big Brother.
Exactly on point about html and WWW being a better representation for the beginning of what people consider the birth of the internet.
While precursors might have existed before this song released, most wouldn’t consider the internet existing before there were commercial options. These didn’t start to manifest until the internet protocol suite was released as open source in 1989 and commercial ISPs started selling access.


It’s always DNS


I mean, solder melts at temperatures lower than 300 degrees Celsius.


You are just trolling right?
What sex would you characterize a person who has developed both male and female sex organs if there aren’t really intersex people?


Pieces of shit come in all shapes and sizes.


Thank you. This isn’t a fair use case. They aren’t making a statement parodying anyone. They aren’t using it to report news, teach, or research anything. I would also think fair use laws would prohibit uses that harm the value of the copyrighted work.


Don’t forget his ex-wife is now shagging Don Jr.


Correct. I never stated anything different. I was replying to the statement that “high clock speeds and high wattage are not related” when clearly frequency affects the power output in a linear fashion. Of course changing a manufacturing process is going to likely change the capacitance but the biggest savings in thermal has been the decrease in voltage as the process have shrunk.
I don’t get the downvotes though. I posted an accurate, relevant formula to the discussion and stated a factual statement.


P=C*V2*f
Power increases linearly with frequency.
Marines and soldiers, don’t let them use a partially incorrect fact to attack you.


Also it would be libel, not slander anyways.


A jump host is just a system that serves as an exit point into the restricted network. You can do this with Ubuntu desktop but you need to figure out how you are going to jump into your host. Others have mentioned tail scale and head scale as options for doing this. Tailscale would be an example of an agent based adhoc vpn solution; this would place a dependency on an external provider to host a connection broker service and use an agent that periodically checks into the broker service for connection requests. Headscale would be the self hosted option and you would need to forward a port into your network and you should guard it with a reverse proxy.


Good point about network availability and endpoints.


Since I have no patience, I’ll lay out some items for consideration.
1st, I wouldn’t rely on an ISP router to serve as my end point for a VPN. They likely have access to manage that device and it likely isn’t getting any updates. You are better off implementing it with your own equipment that you keep updated.
If you have a capable security device serving as your router to the external internet and you want full access to your internal network, then you might consider using a VPN that terminates at your router.
I myself am a fan of setting up a jump host and initiating a VPN connection directly to that host when using an agent based solution. Then you can monitor the host for activities, more easily keep your edge device patched, and then use the capabilities of your jump host to interact with the rest of your network. This would require either an agent to periodically poll a platform for connection requests or another form of ingress into your network.


Expand on your use case. Why/what do want to access on your local network when you are not there?
deleted by creator
This is one of our most frustrating fights I have with our security design reviewers. Effectively functionless mitigations that create extra obstacles for our service reps to deal with during troubleshooting. One example is our equipment is installed in access restricted areas, in a locked rack. We don’t need to disable unused Ethernet ports on our networking equipment that exists in a locked cabinet and it will take away our ability to repatch equipment to a different switch in the system to assist in troubleshooting.