what does the service actually do?
Duck DNS is a free service which will point a DNS (sub domains of duckdns.org) to an IP of your choice
age is a simple, modern and secure file encryption tool, format, and Go library.
It features small explicit keys, post-quantum support, no config options, and UNIX-style composability.
Record and share your terminal sessions, the simple way.
Forget screen recording apps and blurry video.
Experience a lightweight, text-based approach to terminal recording.
asciinema [as-kee-nuh-muh] is a free and open source solution for recording terminal sessions and sharing them on the web.
Get things from one computer to another, safely.
This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The two endpoints are identified by using identical "wormhole codes": in general, the sending machine generates and displays the code, which must then be typed into the receiving machine.
The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and do not need to be memorized.
For complete documentation, please see https://magic-wormhole.readthedocs.io or the docs/ subdirectory.
Cryptography engineers have been tearing their hair out over PGP’s deficiencies for (literally) decades. When other kinds of engineers get wind of this, they’re shocked. PGP is bad? Why do people keep telling me to use PGP? The answer is that they shouldn’t be telling you that, because PGP is bad and needs to go away.
There are, as you’re about to see, lots of problems with PGP. Fortunately, if you’re not morbidly curious, there’s a simple meta-problem with it: it was designed in the 1990s, before serious modern cryptography. No competent crypto engineer would design a system that looked like PGP today, nor tolerate most of its defects in any other design. Serious cryptographers have largely given up on PGP and don’t spend much time publishing on it anymore (with a notable exception). Well-understood problems in PGP have gone unaddressed for over a decade because of this.
Two quick notes: first, we wrote this for engineers, not lawyers and activists. Second: “PGP” can mean a bunch of things, from the OpenPGP standard to its reference implementation in GnuPG. We use the term “PGP” to cover all of these things. //
If we’ve learned 3 important things about cryptography design in the last 20 years, at least 2 of them are that negotiation and compatibility are evil. The flaws in cryptosystems tend to appear in the joinery, not the lumber, and expansive crypto compatibility increases the amount of joinery. Modern protocols like TLS 1.3 are jettisoning backwards compatibility with things like RSA, not adding it. New systems support just a single suite of primitives, and a simple version number. If one of those primitives fails, you bump the version and chuck the old protocol all at once.
If we’re unlucky, and people are still using PGP 20 years from now, PGP will be the only reason any code anywhere includes CAST5. We can’t say this more clearly or often enough: you can have backwards compatibility with the 1990s or you can have sound cryptography; you can’t have both. //
This isn’t going to get fixed. To make actually secure email, you’d have to tunnel another protocol over email (you’d still be conceding traffic analysis attacks). At that point, why bother pretending?
Encrypting email is asking for a calamity. Recommending email encryption to at-risk users is malpractice. Anyone who tells you it’s secure to communicate over PGP-encrypted email is putting their weird preferences ahead of your safety.
Get started with Bitwarden through bite-sized courses. Whether you're deploying Bitwarden to your entire organization, setting it up for your family, or just getting started as an individual, these courses have you covered.
Vaultwarden is a lightweight, open-source reimplementation of the Bitwarden server written in Rust. It is fully compatible with all official Bitwarden clients (browser extensions, desktop apps, iOS, Android) and runs on hardware as modest as a Raspberry Pi using under 50 MB of RAM. This guide covers everything: what Vaultwarden is and how it compares to Bitwarden and 1Password, Docker installation, why HTTPS is mandatory and how to solve it without a domain using Localtonet, the correct way to generate the ADMIN_TOKEN with Argon2, how to disable open registration, connecting Bitwarden clients, a complete backup strategy, Fail2Ban brute-force protection, and a dedicated Raspberry Pi section.
Browser extension
- Edit the vault item for which you want to generate TOTPs.
- Select TOTP, which will scan the authenticator QR code from the current webpage. The full QR code must be visible on-screen.
Browser extension TOTP scan - Tap Save once the code has been entered to begin generating TOTPs.
The morality, psychology, and science of ethical child-raising
eBooks
Read the full version of Peaceful Parenting in ePub, Mobi, or PDF
NO TIME??
Read the condensed version of Peaceful Parenting in ePub, Mobi, or PDF
The dimensions of a shipping container are based on standards that ensure there are no issues during shipping. ISO sets the standard for shipping container dimensions.
- General-purpose containers are 8.5 feet (2.59m) high and 8 feet (2.43m) wide. They come in two lengths; 20 feet (6.06m) and 40 feet (12.2m).
- A 40ft high-cube shipping container or extra tall shipping containers are available at 9.5 feet (2.89m).
- 10 feet (2.99m) and 8 feet (2.43m) ISO containers are also available.
ISO 1496-1 originally set the shipping container stacking weight limit at 192,000 kg (423,288 lbs) across the four corner posts. A 2005 revision increased the rated capacity to 213,360 kg (470,400 lbs) for new-build containers. Both figures assume a 1.8G dynamic acceleration factor, meaning the container is rated to hold that load even under the rolling, pitching, and heaving forces of ocean transit. On stable ground, the effective safety margin is even larger. //
A two-high stack of empty containers presents roughly 320 square feet of windward surface area on the long side. At 90 mph wind speed, that surface generates approximately 4,100 lbs of lateral force. Without twist-locks anchoring the upper container, friction alone between the flat steel surfaces will not hold.
Saturday, April 25th, the day this was written, is the 125th anniversary of New York being the first state to require automobile owners to register their vehicles with the state.
That's right. Today is the 125th birthday of everyone's favorite government institution: The Department of Motor Vehicles, or DMV. //
New York's first plates were homemade, bearing only the owner's initials without any numbers. It was Massachusetts that actually issued its first license plates in 1903." //
In fact, the late adoption by the United States leads to one of the few examples of France being in first place in anything that didn't involve snails or surrendering to Germany.
We highly recommend the use of an email server (SMTP) because we could allow MeshCentral to verify user account’s email address by sending a confirmation request to the user to complete the account registration and for password recovery, should a user forget account password as illustrated below
In general, doing --option value is the same as adding "option": value in the settings section of the config.json.
Here are the most common options found by running meshcentral --help
performing a full backup of the MeshCentral server is generally easy to do. For all installations make sure to back up the following two folders and all sub-folders.
meshcentral-data
meshcentral-files
If using NeDB that is built into MeshCentral, you are done. ////
If you have customized the MeshCentral web data, also backup
meshcentral-web
In the domains section, you can set options for the default domain ("") in addition to creating new domains to establish a multi-tenancy server. For standard configuration, the root domain and other domains will be accessible like this :
🔗 https://servername:8080/ — Default domain
🔗 https://servername:8080/customer1 — Customer1 domain
🔗 https://servername:8080/customer2 — Customer2 domain
When a user setup many domains, the server considers each domain separately and each domain has separate user accounts, administrators, etc. If a domain has no users, the first created account will be administrator for that domain.
In my eleven years, I have processed disclosures from members of Congress who traded on:
Pending FDA approvals they learned about in committee.
Defense appropriations they voted on.
Trade policy they negotiated.
Pandemic response measures they drafted.
Interest rate decisions they were briefed on before the public.
None of them have been charged. None of them have been investigated by the Department of Justice. None of them have been referred to the SEC. The STOCK Act has produced zero prosecutions since it was signed on April 4th, 2012.
Fourteen years. Five hundred and thirty-five members. $635 million in trades last year alone. Zero cases. //
The soldier made $409,881 and faces decades in prison. Nancy Pelosi entered Congress in 1987 with a portfolio worth approximately $785,000. It is now worth $133.7 million. That is a return of 16,930%. The Dow Jones returned 2,300% over the same period. Professional fund managers who beat the market for three consecutive years are considered exceptional. She has beaten it for thirty-seven. If a hedge fund produced those returns, the SEC would subpoena the records on a Thursday. She produced them from a building with a chapel and a gift shop.
She announced her retirement last year. No investigation was opened. No disclosure was flagged. Her filings were on time. In my office, on time means compliant. Compliant means closed. //
The soldier used classified information to make $409,881 on a prediction market. He has been charged with five federal crimes. The Department of Justice announced the case on the same day I processed three disclosures from members who traded on committee knowledge worth a combined $3.8 million.
The difference between the soldier and the members is not what they did. It is the building they did it in. He did it from Fort Bragg. They did it from the Capitol. He used a prediction market. They used the New York Stock Exchange. //
The soldier flew to Caracas. He breached a compound. He put his body between a mission and a bullet. The people who ordered the operation were in a building with a credenza and sparkling water. They did not go to Caracas. They went to their brokerage accounts. The soldier made $409,881 and is now in federal custody. The people who knew what he was going to do before he did it made more and filed less. His prosecution is not a failure of the system. It is the system. One conviction per decade, at the lowest level, so the briefing slides can say enforcement exists. The $409,881 is not the crime. It is the cost of making $635 million look supervised.
In my field, we call this self-regulation.
For existing users, use the chsh command (“change shell”):
chsh -s SHELL USER
chsh -s /usr/local/bin/bash root
For future users:
Edit "/etc/pw.conf" defaultshell keywords
When use adduser(), choose necessary shell
Three Sky Arches over Snowy Alps
Image Credit & Copyright: Angel Fux
Explanation: Why are there three arches across the sky instead of two? Last month, after being dropped off by a helicopter at a high mountain peak in the Alps near the Swiss Italian border, an adventurous astrophotographer expected two arches of our Milky Way galaxy to be visible during the night. These were the inner arch looking in toward the center of our galaxy on the left, visible just before sunrise, and the outer arch on the right visible just after sunset. But there were three arches. The surprised astrophotographer soon realized that the sky was so dark that an entire arc of faint zodiacal light was also noticeable -- sunlight scattered by inner Solar System dust. And it artfully connected the two Milky Way arches!