

Thanks for choosing us at .zip :)
Alt: [email protected]
Thanks for choosing us at .zip :)
We’ve opened a piefed instance too - early days yet though: piefed.zip
As nearly always, there is a relevant xkcd.
I jest. Love seeing you around. Everywhere ❤
It’s better to name known safe options rather than leave it up to user search. The entities that work against extensions like uBO are already well aware of their existence, so hiding their names has no benefit.
Case in point - uBlock and uBlock Origin are not the same, with the former being a bastardised version that does ‘acceptable ads’. There are plenty of other poor blocking options out there for the unsuspecting to stumble into besides that.
Personal setup is Librewolf/uBO on the client and pfBlockerNG/Snort for network level blocking/additional security layer.
And welcome to .zip :) Hope you enjoy the new home!
At that point I would expect control of it, or at least for it to respect the configuration it is given. If neither are true, then it just doesn’t go online at all. If that’s part of the main function, then I find an alternative or live without it.
Nothing on the inside should be sending anything to the outside that can’t be inspected before it leaves, with the exception of stuff that is directly driven by a human (guests browsing, etc).
This is the best way, really. Generally, you have much more control over what you plug into it.
A display shouldn’t have anything even approaching what can be called an ‘OS’ on it. Yet here we are.
Sometimes even that’s not enough. I’ve had some questionable kit before that would just ignore the DNS settings fed to it if it thought they were no good, and fall back to something else preconfigured.
pfSense is a wonderful tool for situations like that. Anything intended for local use only here just doesn’t get outside at all. Handy for stuff like a fire stick that only needs to be calling up a local media library.
It can also mangle any DNS requests going out to a different server and redirect them to itself instead. You could do this without it with iptables/nftables on a generic Linux box, but pfSense makes it much friendlier.
There are other packages that can do the same, but physically all you need is one piece of hardware as a bouncer that manages connections between inside/outside.
Half the shit I actually want I just run directly these days, rather than nosing through either.
Just to name a few.
It’s utter bollocks. It used to be the OEM crap that had to be removed or clean installed over. Now you have to spend time unfucking fresh installs.
My 11 image is just about usable, but only after a lot of gutting, reg entries, powershell scripts and openshell.
The railroading to sign in with an MS account has become worse too, but still just about bypassable.
Not out of the goodness of their own hearts mind. It’s probably more because Euro NCAP are going to be deducting score for not having physical essentials in 2026.
Basically what techradar is as a whole. Ad pieces and listicles with baity headlines.
That is a wonderful chart.
Congratulations. Great to see growth :)
As for why, it’s probably due to the censorship screws getting tighter at Reddit. Luigi is a bad word. Eating the rich is verboten. Just 2 examples. Interacting/upvoting such content is now also an offense even if you didn’t write it yourself.
For many, it’s their stop to get off the train. Mine was the API boogaloo.
With any luck, they’ll take some of the users bailing out of Reddit on the nostalgia factor, become mediocre, and die. Again.
Used FF forever, even though the birth and rise of Chrome.
We’re done. The company I IT for therefore is also done. As are friends and family I sort computers for.
The shit now stinks and must be taken out.
You might not have access to the keys for a long period of time.
Only need a moment to take a code and leave the keys there. If the car isn’t otherwise monitored, theft of contents without keys would be trivial.
You’re probably getting busted anyway, but the concept is there.
Grab some keys out a bag in the office while the owner isn’t looking.
Grab a code (it’s out of vehicle range, being inside).
Go to the car park, replay the code and loot the car.
You’d be caught quickly, but it’s doable.
On and off over the last 15 years or so.
Only recently have I become much more comfortable & able to resolve things without resorting to search, stackoverflow etc.
The turnover point was the day I finally learned vi & cron so I could fiddle with an old Buffalo NAS, that was long out of support, riddled with security holes, and offered only very limited tooling.
Was a great learning experience, but it didn’t pan out the way I wanted. So it runs Debian now, supports modern protocols, and continues to serve. Amazing what you can keep in service when you try.