

There is no auth needed for gh runners? Like a secret shared between them and the repo? I would guess repo secrets are not shared when forked… right?
There is no auth needed for gh runners? Like a secret shared between them and the repo? I would guess repo secrets are not shared when forked… right?
Not sure what Disk Manager is, but if it says
USB Mass Storage device detected
It appears to be something. If you do a sudo journalctl -f
before you plug it in, does it tell you what device name it is given? If it is sata-to-usb you are using it is probably /dev/sd[a-z] or so, does anyone show up when you plug it in?
I recently got some Toshibas and they were loud. They also presented with a seek error pre-fail after a few days (all three of them). That propably adds to the volume, but the seagate and wds I switched to just have some clicking noises. Not too bad.
Oh, it is part of the Tor project even. Cool. Thanks. I will read the links.
How does this work? I thought WebRTC is UDP and Tor is over TCP. I don’t really know what I’m talking about here, but I’d like to know some details.
Wait, this is just a post here on lemmy, not a reply in the issue thread? Or am I just not finding it? You should probably have this discussion in the github issue too.
At least for sweden they appear to have shipping options with taxes/duty included. I don’t have in front of me right now, but it was something like 200€ all inclusive shipping on a 500€ order. Something like that.
Analysts using Julia and Mathematica are confused by this meme.
Oh, wow. Just ordered a new computer. I guess it have to include some more disks!
Which part of this is gomuks?
Do you dd the device directly, and while it is running for this?
Which parts are OpenTelemetry for? Is Prometheus Agent, Prometheus Server and Grafana not enough?
Good thing you solved it, then it feels better to try and make this joke:
The reason it’s not working is because you are on the wrong network, that is nacho’ wifi.
Not sure, but I think emacs at least used to have a reputation as a resourse hog and bloated. So maybe that?
For everyone who has not already, this is so worth a read: https://www.gnu.org/fun/jokes/ed-msg.html
Is this a diagram for how it should work? Not how it actually works? Like I put my stuff in the ~/.bashrc, mostly because I think the debian one says like “put your fun stuff below here” or something. The green and grey lines go through the ~/.bashrc, but both of them go through the “no login” bubble in the diagram. But I know my ~/.bashrc works, so the diagram is a suggestion?
If I’m not mistaken, it seems like this is a timing attack and you need a lot of attack attempts to make it work. If you have like a fail2ban rule for ssh it should mitigate this attack to quite some degree, right? (Of course updating would still be the best).
This is how I handle code at work, almost. Program not working? Who has the last commit on the code? You get the question!
It does spell trouble, but you might be able to ask your ISP to give you a public IP in that case.