

Unfortunately I barely have the mental bandwidth to handle a girlfriend, four kids, and two cats.
Oh no, you!
Unfortunately I barely have the mental bandwidth to handle a girlfriend, four kids, and two cats.
And I can see in strong winds. An eye injury in 1998 fucked with my tear ducts, so I don’t get a runny left eye, ever.
I just replaced my car, mostly due to upkeep costs. But while I can manage the car loan as it stands right now, once my grandparents’ house is sold, almost all of my share will go into the car loan.
The severance obviously won’t last forever (6 months-ish), but I live in a “socialist hellscape scandinavian country” (Glenn Beck told me so, I didn’t know how awful I had it until I accidentally watched Fox News in 2008), so even if it takes me a while to land a job I’m not too worried. Plus I have plenty ty of c9ntacts in my current field of work, so even if things were to go to hell, I’m sure I’ll land on my feet.
Not a whole lot I can do beyond what I already have done for unrelated reasons:
“Fuckyeah!”
Then I’d elaborate on what it took to get here.
“Shit…”
But at least Mia hasn’t been part of the equation for decades.
“Phew”
Watermelon and bacon
Any way of having this study an existing database (or dump thereof) and build the graph? I have an oracle database that nobody understands, built by someone else, and I thought something like this could help…
Any way of having this study an existing database (or dump thereof) and build the graph?
Derp, yes. Corrected. VLAN numbers are obviously not related to port numbers in any way.
Yes, but that’s done on the switch. Basically VLAN tags are applied in one of two ways:
Untagged (sometimes called Access) is something you apply on a switch port. For example, if you assign a port to Untagged VLAN 32, anything connected to that port will only be able to see traffic assigned to VLAN 32.
Tagged (sometimesreferred to as Trunk), on the other hand, is for traffic that is already assigned a VLAN tag. For example Tagged 32 means that it will allow traffic that already has a VLAN tag of 32. It is possible to assign multiple VLANs to a Tagged port. Whatever is connected to that port will need to be able to talk to the associated VLAN(s).
In your particular case, the best practice would be to assign two ports (One for each host, obviously) to Untagged 32 (arbitrarily chosen number, any VLAN ID will do, as long as you’re consistent), and all the other ports as Untagged to a different VLAN ID. That way the switch will effectively contain two segments that cannot talk to each other.
As others have said: It will work as you’ve planned it. The subnetting will keep these two PCs separated (If they still need internet, just add a second IP in your router-PC to allow for communication with this subnet).
VLANs aren’t required, but are more relevant when you want to force network segregation based on individual ports. If you really want to, you can add tagged virtual interfaces on these two separated hosts so that the others hosts aren’t able to simply change the address to reach these. The switch should ignore the VLAN tag and pass it through anyway. But again, it’s not really needed, just something you can do if you really want to play with tagged VLAN interfaces
deleted by creator
deleted by creator
I partially agree: I think a lot of “self defense”-claims are bullshit on the basis that in most cases it’s possible to walk away. Stand your ground laws and cops “fearing for my life” is among the worst excuses for lethal force there is.
But given no other choice, when someone’s life is genuinely in danger, I think it’s justified, unless you caused the situation yourself.
Capitalism sucks, but it’s the best we have so far.
Its resource distribution is terribly inefficient, but it’s miles better than the “trust me, bro”-approach pushed by those heavily into alternative systems.
I can see that. It is my firm belief that sometimes, under very strict circumstances, violence is justified because it’s necessary. But refusing to take part in it is a valid position to have.
For example, nobody can force you to take voilent action to save a third party, in the same way nobody can force you to pull the lever in a trolley problem.
I use fail2ban and a non-standard SSH port. 99% of this junk disappears if you run sshd on port 9.
Also, disable password for login - Only use keys.
Same. Hell, the conversation doesn’t even have to be in person - a phone call will do.
As I stated elsewhere, I refuse to take part in any hiring process that involves a one way video aspect. But I’m not 100% against using it as a filter: The first bar in the hiring process is to refuse the video interview.
Not really approaching religion in any way, but Bill Bryson - “A Short History of Nearly Everything” is a neat book if your knowledge about the world is grounded in religious teachings.
Basically it goes through a lot of the scientific knowledge we have today and tells the story of how it was discovered, focusing on giving answers to “how we know what you know”. It’s a bit oversimplified in many areas, but it’s still pretty educational, entertaining, and at times funny.