I do a little bit of everything. Programming, computer systems hardware, networking, writing, traditional art, digital art (not AI), music production, whittling, 3d modeling and printing, cooking and baking, camping and hiking, knitting and sewing, and target shooting. There is probably more.

  • 3 Posts
  • 65 Comments
Joined 3 years ago
cake
Cake day: June 4th, 2023

help-circle



  • If you don’t need stuff publicly accessible, and just need it accessible to you, then set up a small computer on the network as an ssh Bastion host/jump server, put it on a VPN connection with a VPN provider that offers dyndns, forward the ssh port through the dyndns, and then off network, reverse proxy in with socks5 via key based ssh -D to gain access to all the services available inside the LAN.

    Been doing this for a few years, works great and no one is getting in without my ssh key.









  • That’s true, the problem with the original statement is that it is too broadly scoped by “knowledge”, implying that it is any and all knowledge. If I obtain the knowledge to write a singleton in object oriented programming while at work - even if the concept is applied to a work project, and later use the programming concept of a singleton in my own software, then they can’t do shit.

    A simpler example that shows that it’s too broadly scoped is that if I get trained and certified to use a forklift for a job, and later start my own company and have to use a forklift, there is no precedent for my original employer to come after me for using a forklift in my business operation just because I learned how to use a forklift while I worked for them.

    If the knowledge is proprietary or copyrighted or a trade secret and what I do uses any of that, or what I produce is a 1 to 1 product of that, then they can come after me.



  • One of my favorite comparisons is computing to magic. They say that sufficiently advanced technology is indistinguishable from magic.

    A lot of people have a hard time drawing that comparison, but if you tell them that there are very special, rare silica rocks that you can only find in specific places on earth, and that if you inscribe one of these rocks with billions of tiny transistors runes and then power infuse the rock with electricity lightning you can actually make trick the rock into a processor thinking, and that this now let’s you create software incantations which explain to the processor thinking rock how to execute a program do specific things for you, then they begin to see why.