Gesamtlänge aller Episoden: 4 days 1 hour 15 minutes
This begins our series about our RV trip by looking at the planning process. We give a suggestion for a nice online course that is not too expensive, and offer some tips on using Google Maps in planning your trip. Links: https://courses.saadigital.com/p/how-to-plan-your-epic-rv-adventure/ http://www.visitnasa.com/nasa-visitor-centers https://www.palain.com/travel/planning-an-rv-trip/
In this episode, Martin and Chris interview Eric Rescorla, the CTO of Firefox at Mozilla. After discussing the weather situation in the Kingdom formerly known as the UK, our two aging heros go right into browsers, programming languages, the Mozilla ecosystem and internet history and future alike...
At the end, I am a little disappointed in the performance. One of the cell banks was discharging quicker than the others, but I replaced it and it is much more efficient now. All the cells were salvaged from old laptops. Figure 0.1 Click the thumbnail to see the full-sized image Figure 0.2 Click the thumbnail to see the full-sized image Figure 0.3 Figure 1 Click the thumbnail to see the full-sized image Figure 2.0 Click the thumbnail to see the full-sized image Figure 2...
https://onlykey.io/products/onlykey-duo-dual-usb-c-and-usb-a-security-key set __COMPAT_LAYER=RUNASINVOKER example usage https://github.com/freeload101/SCRIPTS/blob/704689e4febf164008089ecaf192cf03dde752c3/AutoHotkey/AutoHotkey.bat#L65 My post about ghosting your backers: https://onlykey.discourse.group/t/onlykey-duo-hello/643 https://twitter.com/operat0r/status/1511475178345222145
The stuff Evil Steve doesn't want you to know with Lurking Prion. This is Season 1, Episode 6. Picking up from the last episode, we are now delving in to the security measures we can implement to make ourselves a less attractive for Evil Steve. After implementing 2FA, we should now be setting up and using a password manager. Then we look for and changed passwords involved in known breaches (haveibeenpwned - link in show notes). The show is approximately 19 minutes long...
Carl talks about a method to move function definitions to the bottom of a script using sed: #!/bin/sh source <(sed '1,/^exit/ d' $0) __say "hello" exit __say() { echo $1 } Guest Host #1 (scroll to the bottom to ruin the surprise) talks about the shift command using this example: startdate="$1" # Pick up date shift days=0 # Loop through args and create events while [ $1 ] ; do # as many times as you add a timestamp [ $1 !=...
Everything You Always Wanted to Know About PEX Part 03 – PEX and the City (Ordinances) - How to make certain your installation meets code This will be a short episode, but a very important one. Since we have people from around the world who listen to Hacker Public Radio, I cannot begin to speculate what your local building codes allow or prohibit. In the majority of states within the United States of America, a property owner can perform plumbing maintenance on their own residence...
The stuff Evil Steve doesn't want you to know with Lurking Prion. This is Season 1, Episode 8. In this episode, I have a discussion about Internet security with special guest and author, R. Brady Frost along with his son and mine. The discussion revolves around how our kids view Internet security and we discuss dangers they hadn't considered. Pics of the week: Hackers (The Movie) https://www.imdb.com/title/tt0113243/?ref_=fn_al_tt_1 Our Flag Means Death https://www.imdb.com/title/tt11000902/ R...
Sgoti's Network Documentation. Device List. Device01, TP-Link ER605 Device02, TP-Link TL-SG2210P V3 Device03, TP-Link EAP660 HD Device04, TP-Link Omada Hardware Controller Client List...
Another YouTube list? Yes ;-) I found myself watching YouTube a lot during the worst of the pandemic, and as I saw the world falling apart in many ways. YouTube has been something of a lifeline in the past years, helping me find stuff I actually want to watch, which (mostly) doesn’t have all the fake crap that’s on TV...