
There are tools for converting Hyper-V drives to vmdks that everything can read. Then just fire up new kvm instances and load the disk images.
There are tools for converting Hyper-V drives to vmdks that everything can read. Then just fire up new kvm instances and load the disk images.
What differentiates a dating site from something like Lemmy? The secret matching algorithm?
If asked in a vacuum, there’d be no audible answer.
Unless non-verbal communication was used and the participants could hold their breath long enough.
May??? They’ve been targeting them for years!
Bridge mode disables the router in the modem; if you have an admin account on the modem you should be able to enable it yourself; otherwise you need to get your ISP to enable it. It will turn off all the firewall and WiFi features on the modem.
You need to use their modem quite often, but you don’t need to use their router. They’re usually “all in one” modem/router things these days, but they’re legally required to provide you with a modem in bridge mode if you ask — at that point, an Ethernet cable attached to their modem is effectively attached to the Internet, and you can put your own hardware inside (firewall, Wifi router, etc.).
While you need to connect to their IP gateway, you don’t need to use their DNS services or anything but their IP gateway service.
It doesn’t really matter… the data is managed by a third party in another country. I have no real control over who gets access to it, intentionally or otherwise. Better that the data just doesn’t exist in the first place.
Well yeah. That’s what their tech does. And it’s why I have my ISP’s WiFi offering disabled and the antennas removed and run their router in bridged mode, hooked up to equipment I own that doesn’t call out to the Internet.
Remember that fingerprinting can be your friend… because it’s much easier to fake an online fingerprint than a real one.
You can generate a unique fingerprint with each online interaction; this means that you will always have a unique identity.
Or, you can ensure you always have the same fingerprint as a large number of other people.
Think of it as the difference between using a different valid loyalty card each time you shop vs using one of the famous numbers that millions of other people are also using.
Of course, in both circumstances, you do give up the benefits of being uniquely identifiable.
My mother goes by mum or grannie, but my wife goes my mom, pronounced “mum”.
That’s because “mom” is a shortening of “mother” which is what she is, but “mum” is a shortening of “ma’am” which is a shortening of “madame” which means “my lady” and is what you call someone of a higher social class than you. And she wanted to get as far away from class hierarchy in the house as possible.
They’re both generally “my mother” when spoken of in the third person by me or my kids.
I’ll second the SQL database here. Especially since most people who use a spreadsheet actually treat it as a database in the first place, and not as a way to lay out data in a 2D table.
But if a hierarchical table is really what’s desired, any visual database interface should do the trick.
Little Snitch on a Mac.
There are an infinite number of programs that could do this. Will they? Probably not.
Best thing is to install a trustworthy personal firewall, and block all outbound network access for all processes, and then enable as needed. This won’t stop Windows itself, but it will give you a heads-up if something else is trying to send data somewhere and you can make an informed choice at the time.
Bards. There were bards.
It’s the answer that came to my mind when I saw the question. I was not disappointed to see someone had already written it 😃
Depends on your local laws. If there are no municipal or regional laws against it and the zoning allows for it, yes, you could do it.
You could also form a corporation that is owned by a lot of people and use that to buy a regular plot of land, and that would usually comply with local regulations. That’s how strata corporations work.
On the other side of this, I once had a co-worker who bought a keystroke recorder and attached it to his own computer.
The person who had been messing with his computer saw the mini camera he had set up but missed the keylogger. He was able to figure out who it was and what they were up to from that.
Why over 11?
Wow… Congo Red and Methylene Blue are toxic stuff. If this is affordable, it could really improve quality of life for a LOT of people.