True, but your post did kinda read like this:
I don't have problems with murderers being killed. I just don't have faith in the system to prevent false positives.
Oh. Here's your fix:
A longish piece of green grass. Hold it by one end, then slide it on the fence wire like the grass was a violin bow, getting your fingers closer and closer to the fence. At some point you notice a pinging, or your fingers are touching the fence.
You can use this to gauge, very roughly, how powerful the charge is at that point.
RawStory faces immediate arrest for spreading disinformation and falsely representing ongoing legal situations!
It does, though. It doesn't have to make sense to you, but it's natural for people to say "who welcomes me? Who attacks me?" And go with those who welcome them. Is it simplistic? Sure. But either you learn how to take on the educational and emotional burden of reaching out, or you have extra enemies.
Truly a shitpost.
Nah. Time to reread, sodium is absolutely a viable tech now.
What you probably want is a dmz or red/green localnets. A reverse proxy (as others have mentioned) like haproxy or nginx) are extremely unlikely to, themselves, be hacked. But they don't really add security, either.
What does add security is to have a router with a firewall, with one or more red networks, and a green network.
The red network has all of your public-facing servers. They have virtually no external access, and no internal access except to respond. It's even good to have a rule on the router that you can turn on/off that blocks all outbound connections from the red network to the external world. To upgrade a server, turn off the rule, upgrade, and then turn the rule on again. The router only forwards inbound connections from the internet on a specific port, and routes them to the server/servers on the red network(s) on a (possibly different) specific port.
Most ownage-style hacks involve (once compromised) either calling home (can't if the server is not allowed outbound connections) or opening an additional port (who cares, the router will never forward anything to that port).
Then, back up your important info, and keep multiple copies of that info - daily for a week, monthly for a few months, and yearly.
No. The ROG brand is ASUS's brand in the first place.
Like, anyone could be like "this is my normal quiche, and this one here is my MuMu quiche."
Then, once everybody's buying MuMu, start using the normal recipe for MuMu. It's not illegal, but at first people think they just got an Ok MuMu, then they start realizing it just sucks now. Hard for the company to recover from that.
But voiding and not honoring warranties?
Yeah.
Anything but revolvers, bolt-action, and pump-action. ..well, there's muzzle loaders, too.. Kinda extreme.
The task question is:
Is Online Office 365 good enough for you? Or, is an 'almost fully compatible' word processor enough?
The features are there, but it's a whole new interface to learn, and if you export to a word document, the document produced may look wonky when viewed in word. OTOH, whatever PDFs you produce, those will look right. And if Online Office 365 is enough, that's great, because you won't have to worry about that.
You'll need to establish a workflow, and others in your office will need to use (and get used to) the same workflow.
It's not a small leap for an office to take. I love Linux, but check out that it has what you need before you fully commit. Give it a try by dual-booting or by installing it on a secondary system.
Sure, but let's just clarify that this is someone going out of their way to create this problem, using Python's ability to read it's own code.
Basically, you can load any text file, including a source code file, and do whatever you want with it.
So, a function can be written that finds out whatever's calling it, reads that file, parses the comments, and uses them as values. This can also be done with introspection, using the same mechanism that displays tracebacks.