Do all versions of Android have this? I’m on Samsung Android 14 and I can’t find this.
Do all versions of Android have this? I’m on Samsung Android 14 and I can’t find this.
Agree that we are behind with GUI support for secure DNS and I like how enthusiastic your are about the script. Unfortunately, this is just a teaser.
Actually, the functionality should be in systemd-resolved or network manager (or elsewhere maybe). And then configured via the default GUI. This will take time.
You know they are the same user because mastodon has a protocol for Migration. Basically, you announce on the old instance what your new handle is and confirm from the new instance that this is where you came from. Mastodon then migrates your followers (and blockers). So you can change instances transparent to others.
Of course, this migration is more work than simply creating a fresh account, so i doubt this helps against spammers, but it may help against annoying people.
Have you looked into how existing software handles captive portals. I believe, both Ubuntu (or Gnome or Network-Manager) and Firefox do check for such portals and detect real internet access. (They simple poll some URL http://detectportal.vendor.com and check for the expected return code. Portals usually redirect.)
Now I’m thinking, what if this check could trigger a change to the DNS configuration. That is use DoT when internet is available, otherwise fall back to DHCP announced DNS
That was also my question. A broader question is how to access services on the local network that are announced through local DNS? Like your router’s web interface or any similar device.
Can you have split routing? Most queries go to our preferred DNSoverTLS endpoint, but some go to DNS53 on the local network.
This would also solve the captive portal if the host used to detect captive portals is always resolved locally.
Person who engages in dating also has a job.
Point for you, root is special.
The x permission on directories is exactly for this purpose. You can use the directory. You cannot read (requires rx), you cannot write (w), but you can ‘cd’ and operate on files in the directory.
This is important, you can lock someone out from a directory tree buy not giving them ‘x’ on the root. So, if your home is rwx------, no one but the owner can do anything in your home. This is effective even if some files and subdirectories have less restrictive permissions.
FeedMe
Which of those work for phone numbers (SMS validation)? Email is easy.
We ignore them, mostly. You cannot miss what you don’t know.
There are plenty of options however to access software not available natively. Both VMs and Remote Desktop solution work for a wide range applications. Web-based solution can be as good as desktop programs.
So many casual applications are now either web-based or on your (not FOSS) phone, so for my personal use the thought of using Windows has never crossed my mind. Professionally, I resort to remote Windows or a Mac.
Why not? Some VPN providers operate their own network of DNS servers to avoid leaks via DNS, e.g. mullvad.
If you explain your setup (os?), some one will help.
Interesting.
Well I’m thinking the same, but then I’m not sure where to put this video (ignoring the sound track) on a scale from drunken singing to obvious Nazi salute.
Maybe i don’t know enough about Bierzelt culture. If they were singing Hölle, hölle, hölle or Atemlos, would you notice the (right) arm in the air? The arm movement seems unnatural (if the intention was signing with arms in the air), but this could still sort-of pass as not 100% Heil Hitler.
The band chose the song, for sure, that’s questionable. The event organisers should not allow this to happen. But the guests, should they leave? Sit down quietly and wait for the next song?
I could be in that tent and not recognise the song. Not my kind of music.
I could see people innocently copying the movement of others. It may be a tent full of Nazis, scary, but the video does not proof this.
This did not happen at Oktoberfest (Munich, Bavaria). This was in some village in Saxony.
Can someone explain what’s the point?
There’s some exam, online, runs in a browser. Ok.
Now we require a special browsers. Why?
Which only runs on Windows, but not in a VM, unless you make a small change. Why?
To stop cheating, I assume, but what kind of cheating needs a VM? Maybe I’m old, but we had handwritten cheat sheets on paper.
Are students using cheat software now that solves math problems for an online exam? And if they do, shouldn’t this score bonus points? Sounds like challenging problem to code an AI that she’s your exam.
That’s a complicated way to say:
Both comes at a cost, generally, but free options are available depending on your needs.
Someone should clarify if this
Contactless payments use the EMV protocol. Leaking the cc number is bad, but happens all the time. An actual payment athorisation replaces both PIN and signature. The victim’s bank will argue that the victim authorised the transaction at the POS.
Just a note: The app ‘Rethink DNS and Firewall’ can do this with any Wireguard VPN.