

Aah so “opening a port” refers to port forwarding? I’d assumed it only meant allowing traffic through with firewall config.


Aah so “opening a port” refers to port forwarding? I’d assumed it only meant allowing traffic through with firewall config.


I don’t think that applies if you’re NATted? Since you don’t even have a port at the outer layer unless you reach out first.
Are there any benefits, in terms of performance or security in ‘wiping’ or overwriting an SSD before reinstalling Linux?
No


Your ISP would need to support/allow this in the first place, right?


Can someone clarify this for me: is the below true?
Even if a port is exposed on a regular residential network (no public IP address), due to NAT, nothing will be able to reach that port unless the application running on that port is trying to reach outside at the same time (for the purpose of NAT traversal)?
That’s not at all how it works.
flathub still allows unverified submissions which is what I proposed. So, no, it wouldn’t.
At the very least aur must verify you are associated with the domain name of the project, same as flathub.


There are <250USD used frameworks?
That’s the primary value offer of nushell so at least people who made it considered it I’d say.


Looks pretty


Aah my web client wasn’t showing any links in your original message.


good source in case anyones interested. I’m fine with them generally being available.


Not seeing where it says install arch


Malware targeting individuals rather than servers do not need privilege escalation. They just need to run as the user and swipe cookies/credentials/wallets etc. Privilege escalation would allow them to do catastrophic damage but that’s not the point in that case.
majority of unixporn posts are people copy pasting premade hyprland configs so…
How dare those people make and release software for free but don’t dedicate more of their time to me!
deleted by creator
Running those adblockers on your devices is extremely insecure. They register as a VPN and intercept HTTPS traffic. They decrypt the encrypted traffic, filter it, and encrypt again meaning all your communications are signed by this single app’s certificate. Not to mention any vulnerability would wreak havoc.
I don’t really care for this one (though it is pretty cool) but I’d love to be able to run Android applications natively on Linux in a way applications cannot detect so some moron dev doesn’t try to block Linux.
I wonder if this effort is going to bring us any closer to that.