

I’m just here to gather a list of CIDR’s to block from our hosted apps. These things attract bad actors for 99% of their use. Thanks OP!


I’m just here to gather a list of CIDR’s to block from our hosted apps. These things attract bad actors for 99% of their use. Thanks OP!



This is how I handle DHCP connections with endpoints, plus I don’t want to expose the origin.
curl ip.me and change a varnish config line every 5 minutes if it changes.


If you use “maxxing” as a suffix, I instantly hate you. You’re already vibe-coding, which probably means you couldn’t pour piss out of your boot if directions were slapped on the heel.


Everyone should start wearing clothing with known cartel member faces silk-screened on every inch.


I don’t see a suggestion to use MACFuse here, so I’ll just drop this here: https://macfuse.github.io/
Copy your ssh pub key to the device ssh-copy-id user@hostname
Then just mount it:
sshfs user@hostname:/remote/path ~/mnt/myfiles \
-o reconnect \
-o ServerAliveInterval=15 \
-o ServerAliveCountMax=3 \
-o follow_symlinks \
-o IdentityFile=~/.ssh/id_rsa


deleted by creator
I taught my nieces how to design a basic web page and they loved it. Seeing things change in real time from another language was eye-opening for them.


Mutt was too much.
Restored my backup and have all and none of the files, sir. Don’t look at it until we fsck.


Reminds of trying to register for a .ad domain.


Ahhhh, Napster/Kazaa and Metallica vibes all over again.


Ugh, I seriously appreciate you ruining my optimism.


I seriously tried looking for a connection with her portfolio’s available online, she seems clean and genuinely just advocating woman to use it. That’s what it looks like right now, at least in public view. Don’t blame anyone in the slightest for the cynicism though in the current atmosphere.
E: Welp, there goes my optimism.
k8s will be a given when your containerizations grow beyond whatever devops git magic you’re doing. I would reconsider that, and throw in something like argocd. The rest is just standard.


Initial rollout: Sir, every device on earth is controlled by someone at least 21 years old on xxxx-01-01 !


Thankfully we only give two possible endpoints on two different addresses for all our domains … this is good to know because I was thinking about using SANs as well. Thanks for the warning!


Oy, letsencrypt with dns challenge and nsupdate have me automated on the SSL side, proxy for spam, all I care about is the first two now. Yeah, not an easy task, but paying for a spam proxy took 90% of maintenance away.
Looks like he’s a tool … maybe sed/awk?