- Melon Loader: https://melonwiki.xyz/
- TLD Mods Notes: https://a.plas.ml/shaare/Ksqi_g
- Sky Co-Op Mode: https://tldmods.com/?q=sky
- https://github.com/RED1cat/SkyCoopInstaller/releases/tag/v2.2
- verify Dependencies are copied to Mods folder
TL;DR: If you want to operate a secure environment you should use your own on-site stratum 1 NTP servers along with authentication. This is the only way to eliminate time spoofing attacks from the outside. Don’t reduce your overall security to a stateless and unauthenticated (read: easy-to-spoof) network protocol!
If you are using a couple of different NTP sources it might be not that easy for an attacker to spoof your time – though not unfeasible at all. And think about small routers with VPN endpoints and DNSSEC resolving enabled, or IoT devices such as cameras or door openers – they don’t even have a real-time clock with a battery inside. They fully rely on NTP.
This is what this blogpost series is all about. Let’s dig into it. ;)
Ballade Pour Adeline Sheet Music Richard Clayderman. Download free Ballade Pour Adeline Sheet Music Richard Clayderman PDF for Piano Sheet Music More Sheets
“Ballade Pour Adeline Sheet Music’” (French for “Ballad for Adeline”) is a 1976 instrumental composed by Paul de Senneville and Olivier Toussaint. Paul de Senneville composed the piece as a tribute to his newborn daughter, Adeline. The first recording was by Richard Clayderman and world-wide sales now have reached 22 million copies in 38 countries. It remains Clayderman’s signature hit.
For the uninitiated, “The Nutcracker” tells the story of a young girl, Marie (sometimes called Clara), who receives a nutcracker doll on Christmas Eve. That night, Marie experiences a fanciful dream; she and the Nutcracker Prince battle the evil Mouse King, then journey to the Land of the Sweets. The original production was choreographed by Marius Petipa and performed in December 1892 at the Imperial Mariinsky Theatre in Saint Petersburg, Russia. The man responsible for making “The Nutcracker” a yearly American tradition is the iconic choreographer George Balanchine.
If “The Nutcracker” isn’t yet a holiday tradition in your family, here are some compelling reasons why it should be. The ballet is for and about kids. When Balanchine, director of the New York City Ballet, staged the first American production in 1954, he cast children in many of the roles, including Clara and the Nutcracker Prince.
Balanchine’s version became a massive success after it was televised in 1957 and 1958. It then became standard practice for companies staging the ballet. By making children central to the story, Balanchine gave countless dancers their start — and inspired thousands of others to fall in love with ballet.
Silver badge
Deranged
Twitter before Musk bought it, used to reserve blue check marks for accounts deemed noteworthy and needing protection from impersonation.
This is complete fiction.
They were handed out to anyone "PLU" or showing strong anti-pleb behaviour or the subject of media attention. They were handed out as inducements to attend Twitter presentations. They were handed out to people who knew someone who knew someone in Twitter. I've run across a nontrivial number of anon accounts who just logged in one day to discover they'd magically got a bluetick. Etc etc
There was zero "verification" in the sense the EU is now claiming, for the majority of bluechecks.
What it WAS was a signal that you were "one of the in-crowd". The end.
The EU from the get-go has shown a deranged obsession with the switch of meaning of the blue badge (HEAVILY announced in media and on X) from "SPECIAL!person! Not a pleb!" to "Subscriber". It actually took them quite a while to think up the extra "reasons" of ad info and free database dumping.
Even MORE surreally: X has ACTUAL verified checkmarks for formal entities. Eg government, eg companies. These are not bluechecks, though, so the EU is demanding they be changed to blue.
...
Musk changed all that in a bizarre bid to make blue checks less exclusive, rendering them nothing more than the mark of someone willing to pay for a premium X subscription.
A "bizarre bid" to turn around the catastrophic financial dumpster fire that Twitter was, by doing the "bizarre" thing of... earning money.
I have to say: this is the first time I've ever seen someone try to re-badge "subscription revenue" as "bizarre".
The move led to chaos as paid blue-check accounts impersonated brands, bots multiplied, and users were left unsure who to trust, one of several issues that drew the EU's scrutiny under the DSA.
Of the 3 items here: the last 2 are complete fiction. Charging money for premium service creates bluecheck bots? Other way round. Users are all socially-terrified emotionally-damaged 10-year-olds who believe that the twitter screen is their mummy? Less than 0.3% of X users in Australia are under 16 let alone under 10.
Re the 1st: yeah, a handful of pranksters and ratbags slipped in faster than the brands: verified themselves, subscribed, then changed their usernames. Lasted about 2 weeks. Mostly amusing. The only damage I'm aware of is to the blood pressure of the PR depts in a few companies, on realising they needed to get onto X to claim their brand back.
"So one of the things that we're seeing is the whole movement away from passwords to passkeys – a certificate-based authentication wrapped in a usability shrink wrap," Forrester VP and analyst Andras Cser told The Register.
Passkeys are typically what security folks mean when they say "phishing-resistant MFA." They replace passwords, and instead use cryptographic key pairs with the public key stored on the server and the private key – such as the user's face, fingerprints, or PIN – stored on the user's device. higher bandwidth demands.
Reported in Nature this week, the study notes that audiovisual glitches break the illusion of a face-to-face meeting, damaging interpersonal judgments.
The authors argued that distorted faces, misaligned audio and visual cues, and choppy movements resulting from technical failures can create an "uncanniness, a strange, creepy or eerie feeling." //
Some might think the resources of the tech industry could eliminate such problems and their resulting impacts in the real world. But priorities seem to lie elsewhere.
The study's authors noted that older technologies like phone calls have fewer glitches now, but keep getting displaced by those that require more bandwidth. New conferencing methods such as 3D group functionality and VR will have even higher bandwidth demands.
Thirty years ago today, Netscape Communications and Sun Microsystems issued a joint press release announcing JavaScript, an object scripting language designed for creating interactive web applications. The language emerged from a frantic 10-day sprint at pioneering browser company Netscape, where engineer Brendan Eich hacked together a working internal prototype during May 1995.
While the JavaScript language didn’t ship publicly until that September and didn’t reach a 1.0 release until March 1996, the descendants of Eich’s initial 10-day hack now run on approximately 98.9 percent of all websites with client-side code, making JavaScript the dominant programming language of the web. It’s wildly popular; beyond the browser, JavaScript powers server backends, mobile apps, desktop software, and even some embedded systems. According to several surveys, JavaScript consistently ranks among the most widely used programming languages in the world. //
The JavaScript partnership secured endorsements from 28 major tech companies, but amusingly, the December 1995 announcement now reads like a tech industry epitaph. The endorsing companies included Digital Equipment Corporation (absorbed by Compaq, then HP), Silicon Graphics (bankrupt), and Netscape itself (bought by AOL, dismantled). Sun Microsystems, co-creator of JavaScript and owner of Java, was acquired by Oracle in 2010. JavaScript outlived them all. //
Confusion about its relationship to Java continues: The two languages share a name, some syntax conventions, and virtually nothing else. Java was developed by James Gosling at Sun Microsystems using static typing and class-based objects. JavaScript uses dynamic typing and prototype-based inheritance. The distinction between the two languages, as one Stack Overflow user put it in 2010, is similar to the relationship between the words “car” and “carpet.” //
The language now powers not just websites but mobile applications through frameworks like React Native, desktop software through Electron, and server infrastructure through Node.js. Somewhere around 2 million to 3 million packages exist on npm, the JavaScript package registry.
You can completely disable Gemini in Gmail, Docs, Drive, and more.
Google Photos has separate Gemini settings you must turn off, too.
Chrome users can also disable Gemini directly in browser settings.
Are you frustrated by Google's insistence on injecting Gemini into everything? While some do enjoy Google's latest AI tools and smart features, which seem to roll out every week, others might prefer things the way they were before.
Despite efforts in recent years to gain clarity, the roughly 110-mile state line between Michigan and Indiana remains blurry as ever.
The last official survey of the dividing line between Michiganders and Hoosiers was conducted in 1827, and wooden markers placed by federal surveyors at that time have largely rotted into the pastoral landscape.
Some surveyors have estimated that the state line generally accepted by locals could be off by a few feet in some areas, creating potential areas of conflict. //
Despite putting out two requests for proposals, the state didn’t get any bites from private surveying companies willing and able to take on the large project.
“We didn’t receive any qualifying bids,” Andrew Brisbo, director of Bureau of Construction Codes for Michigan’s Department of Licensing and Regulatory Affairs, told lawmakers during an October Senate committee hearing.
“We went back and discussed with the commission whether it might be a better approach to provide the funding to the county surveying programs on the border,” he continued. “They have the capacity to do the work, and they can just build it into those programs in order to get the work done.”
The Strasburg Train offers a stunning ride through Pennsylvania Dutch Country.
After centuries of dam building, a nationwide movement to dismantle these aging barriers is showing how free-flowing rivers can restore ecosystems, improve safety, and reconnect people with nature.
With more than 550,000 dams in the United States, free-flowing rivers are an endangered species. We’ve dammed, diked, and diverted almost every major river in the country, straightening curves, pinching off floodplains, and blocking passage for fish and other aquatic animals. But this has come at a great cost. Freshwater biodiversity—all the organisms that hail from our rivers, streams, lakes, and wetlands—is among the most threatened on the planet. Dams have played a big role in that demise, pushing fish, mussels, and other animals to the brink, and some over it. In North America, nearly 40 percent of fish are imperiled, and 61 species have blinked out since 1900.
A growing dam removal movement has led to some 2,200 dams being blasted and backhoed from U.S. rivers—most of them in the past 25 years. It’s an extraordinary turn of events for a dam-loving country. //
The United States emerged from the Great Depression into a dam-building frenzy that lasted more than 30 years, dubbed the “go-go years” by Marc Reisner in Cadillac Desert, his iconic book on western water. Between 1950 and 1979, approximately 1,700 dams were built each year.
Mike: (during his and Pearl's neighborly chat) So... you are gonna send us a movie though, huh?
Pearl: Yeeeaaah. And it's pretty bad. I hope that's okay. It was made in Vermont and it's about this guy who travels through time, and then he has to go back in time to change what he did in the future. It's- it's called Time Chasers. Oh, it's got that guy in it. Oh, and that other guy, too.
Film watched: Time Chasers //
[In the dystopian future, an eyepatch-wearing armed survivor leaps atop a smashed car for a better shooting angle]
Mike [as Gunman]: Arrgh! Sixteen men on a dead Dodge Dart! //
Crow: But I only have one jar of mustard!
[In the dystopian future, an eyepatch-wearing armed survivor leaps atop a smashed car for a better shooting angle]
Mike [as Gunman]: Arrgh! Sixteen men on a dead Dodge Dart!
it would be very nice not to have to do two consecutive resilvers - one for each failing drive. Luckily, ZFS allows you to amortize a single resilver operation over multiple drives.
The workflow is almost identical - you begin by doing a hot-spare resilver of the first drive:
zpool replace POOL da13 da99
... but then, after that command completes and you verify that the resilver has properly begun (by running 'zpool status') you simply run a second 'zpool replace' command with the other pair of failing/spare drives:
zpool replace POOL da15 da100
Your 'zpool status' output will then show two drives resilvering with two different hot-spares and your time to completion will not increase much as compared to when you were only resilvering one drive.
Append-Only backups with rclone serve restic --stdio ... ZFS vdev rebalancing ... borg mount example
TrueNAS Scale, Unraid, and OpenMediaVault stand at the apex of the Network-Attached Storage OS landscape, with each distribution featuring its own perks and quirks. However, they’re far from the only options at your disposal. Even without harnessing the power of virtualization, you can turn Proxmox into a reliable file-sharing server once you arm it with the right set of packages – and the same holds for Debian, Fedora, and other general-purpose distributions.
But on the other side of the popularity spectrum, you’ve got obscure distributions that are seldom discussed by tinkerers, data hoarders, and home labbers. In my search for wacky projects and cool DIY ideas, I recently stumbled upon XigmaNAS, a FreeBSD-powered distribution designed for storage servers and NAS solutions. Having played around with it over the weekend, I’ll admit that XigmaNAS deserves far more credit than it currently receives.
Ping & traceroute
If you suspect a network problem between the monitoring system and your server, it’s helpful to have a traceroute from your NTP server to the monitoring system. You can traceroute to the monitoring network using 139.178.64.42 and 2604:1380:2:6000::15.
You can ping or traceroute from the monitoring network using HTTP, with:
curl http://trace.ntppool.org/traceroute/8.8.8.8
curl http://trace.ntppool.org/ping/8.8.8.8The Three Bible Timelines: Why and How They Differ
February 25, 2013
Last updated on November 3rd, 2015 at 01:48 pm
The three most widely used Bible Timelines are:
-
Ussher’s Chronology: included in the margins of the Authorized King James Bible is based on the Masoretic text of the Hebrew Old Testament. The Masoretic text had an unbroken history of careful transcription for centuries.
-
Thiele: a modern Biblical chronologist whose work is accepted by secular Egyptologists as well as biblical scholars – often used by modern Evangelicals.
-
The Septuagint: on which the Catholic Bible is based, is the Koine Greek version of the Hebrew Bible translated between 300 BC and 1 BC.
Most people who try to compute a Bible timeline are faced with the same dilemmas. The Rvd. Professor James Barr, a Scottish Old Testament scholar, has identified three distinct periods that Ussher, and all biblical chronologists had to tackle:
-
Early times (Creation to Solomon). Anyone who starts out reading the Bible with Genesis, as many people do, can easily compute the years from Adam to Solomon.
-
Early Age of Kings (Solomon to the destruction of the Temple in Jerusalem and the Babylonian captivity). Now we have gaps in the record.
-
Late Age of Kings (Ezra and Nehemiah to the birth of Jesus). Here events are just mentioned with no possible way to link or calculate time frames. Historians use well known secular kings or events mentioned in the Bible (i.e., Nebuchadnezzar) to calculate the Bible dates.