Can get to 14 by counting knuckles.
Can get to 14 by counting knuckles.
Until out of habit you rub your eye with your knuckle. Doh!
Really? Have you set up services with docker before? I found it super easy compared to other systems. Curious what specifically threw you as I barely did anything except spin it up.
Can’t talk to them, but you can certainly barter and form alliances with corvids.
Bortles? Is that you?
Nothing specific, just knowledge from those closer, and not likely they’ll publicize ad spend, but uptick was seen. Bluesky ads started around April when they had the big influx after the first suspension. Overview, but not a reference: https://www.bbc.com/portuguese/articles/cm2nkdkypk7o
Take Brazil. Blusky saw the writing on the wall with Twitter, so they threw a ton of money into media. Guess where everyone went.
Sad story about buying this one, though: https://youtu.be/k7Xu4GvpN9U
Hope you did it on Steam. 75% off so $10
The periodic table, also known as the periodic table of the elements, is an ordered arrangement of the chemical elements into rows (“periods”) and columns (“groups”). It is an icon of chemistry and is widely used in physics and other sciences. It is a depiction of the periodic law, which states that when the elements are arranged in order of their atomic numbers an approximate recurrence of their properties is evident.
https://en.m.wikipedia.org/wiki/Periodic_table
That being said, the whole point of a quick-lookup reference chart is to be a… well…
Edit: this was supposed to be on the main post, not the furniture joke, but… well…
While I agree with this commenter’s sentiment, it goes to the “over the top” comment from PumkinEscobar. I’m a fan of PE’s method. Simple, quick, lighthearted, feels like a side-thought that’s more, which makes it easier for both parties to recover from (if needed, hopefully not).
I guess they magically knew it was them? And there you go again with “work.” Shadowsox has already been mentioned for randomized https traffic. Feel free to learn from the other comments.
He literally said he had already been identified. Read.
You, as a network engineer, at a business, where SSH is normal. This is not your realm, as schools look for very different signals. They are rarely actively monitored, but when they are, SSH will 100% look suspicious, and this individual already has a flag on them for tor, so yes they go beyond MAC and can identify them. You haven’t even asked what kind of school it is, how they access school content when on the network that could identify their machine, or what the risks are for getting caught, yet you want to push a method when others have provided better8 options for obscurity. I am looking out for this kid’s (or adult’s) well being.
Yes, your method works to bypass a firewall, I have even used it myself many times. But it is absolutely not the best option here. And before you ask for credentials again, yes, I have network security experience in multiple domains, including corporate provided POC exploits for software you would know the names of, threat modeling for highly sensitive data, and organization and management of certified systems, along with knowledge of school network infrastructure.
Again these are all assumptions. These are risks that do not need to be taken when there are better methods.
Putting this here,too:
Highly identifiable. Do not do this. Will it get you through the firewall? Yes. Will it get you in trouble when they see all your traffic going to one place? Also yes.
Highly identifiable. Do not do this. Will it get you through the firewall? Yes. Will it get you in trouble when they see all your traffic going to one place? Also yes.
And if you host your own VPN, it’s identifiable as a single destination for your connection.
Nothing, it’s just close by 😆 And the X-Files museum is on the way.
Since when is “atleast” a word?