it’s more likely they’re a regular-sized linux user and it’s only their inflatable penguin which is giant
cultural reviewer and dabbler in stylistic premonitions
it’s more likely they’re a regular-sized linux user and it’s only their inflatable penguin which is giant
It’s free software which you can host yourself. The source is here (GPLv3). You can read more about the people that make it here: https://en.wikipedia.org/wiki/Framasoft
because you carefully photoshopped the silhouette of a prone person into the bar graph
How do I see all posts in all communities on a server?
By selecting “Local”. And you can sort by “New” to see them in chronological order. eg, here on your instance.
source: https://existentialcomics.com/comic/364 (it has mouseover text too…)
I can’t be the only Ersalrope Wars buff here, right?
This add-on is not actively monitored for security by Mozilla. Make sure you trust it before installing.
It’s pretty lame that Mozilla’s addons site still doesn’t show source code which is guaranteed to correspond to the binary you’re installing.
Anyway, I went and read the source on github (which probably corresponds to the extension one can install) and while this part seems very straightforward this other part exceeds my understanding 😂 (i’m not suggesting it is malicious, i just don’t understand everything it is doing there or why it is necessary).
What I was really looking at the source for was to see if they were simulating keystrokes (and inserting plausible delays between them) to defeat a more determined anti-pasting adversary, or if they were simply suppressing the hostile website’s onPaste handler so that pastes can happen as normal. And: they are doing the latter.
I wonder if any paste-blocking websites detect and defeat this extension yet?
I can think of two ways: either using a password manager with a browser extension, or using the browser’s built-in one.
bonus: make it something easy to remember, like your year of birth
just in case Ars Technica has to remove it someday (perhaps for licensing reaasons? 😭), i am pasting a screenshot here of the excellent image illustrating this article:
(disclaimer: this information might be years out of date but i think it is still accurate?)
SSH doesn’t have a null cipher, and if it did, using it still wouldn’t make an SSH tunnel as fast as a TCP connection because SSH has its own windowing mechanism which is actually what is slowing you down. Doing the cryptography at line speed should not be a problem on a modern CPU.
Even though SSH tunnels on your LAN are probably faster than your internet connection (albeit slower than LAN TCP connections), SSH’s windowing overhead will also make for slower internet connections (vs rsync or something else over TCP) due to more latency exacerbating the problem. (Whenever the window is full, it is sitting there not transmitting anything…)
So, to answer OP’s question:
--rsh=ssh
as that is the default).man rsync
and read the section referred to by this:
The remote-shell transport is used whenever the source or destination path contains a single colon (:) separator after a host specification. Contacting an rsync daemon directly happens when the source or destination path contains a double colon (::) separator after a host specification, OR when an rsync:// URL is specified (see also the USING RSYNC-DAEMON FEATURES VIA A REMOTE-SHELL CONNECTION section for an exception to this latter rule).
HTH.
deleted by creator
they do not work for individual applications
as someone else replied to you earlier, waypipe exists, and is packaged in distros, and does what you’re asking for.
There is also a newer thing called wprs, “Like xpra, but for Wayland, and written in Rust”: https://github.com/wayland-transpositor/wprs#comparison-to-waypipe which sounds promising
deleted by creator
same here; other articles there load fine but this one gives me HTTP 500 with content-length 0.
(the empty body tag in your screenshot is generated by firefox while rendering the zero-length response from the server, btw.)