I like your pitch black humour.
He could ask for clarification and discuss word definitions if the situation indicates a misunderstanding.
Thanks. I thought it was about counting. It all makes a lot more sense now. (And it also doesn’t.)
How?
Yes, if you push the circles down a bit, it forms a 7 by 7 matrix. But if pushing the circles into a square matrix is not allowed: how?
Edit: I get it now. It is about (efficient) packing not about counting. I also get the 4th panel now…
One aspect is how interesting you are as a target. What would a possible attacker gain by getting access to your services or hosts?
The danger to get hacked is there but you are not Microsoft, amazon or PayPal. Expect login attempts and port scans from actors who map out the internets. But I doubt someone would spend much effort to break into your hosts if you do not make it easy (like scripted automatic exploits and known passwords login attempts easy) .
DDOS protection isn’t something a tiny self hosted instance would need (at least in my experience).
Firewall your hosts, maybe use a reverse proxy and only expose the necessary services. Use secure passwords (different for each service), add fail2ban or the like if you’re paranoid. Maybe look into MFA. Use a DMZ (yes, VLANs could be involved here). Keep your software updated so that exploits don’t work. Have backups if something breaks or gets broken.
In my experience the biggest danger to my services is my laziness. It takes steady low level effort to keep the instances updated and running. (Yes there are automated update mechanisms - unattended upgrades i.e. -, but also downwards compatibility breaking changes in the software which will require manual interactions by me.)
In my opinion it is its limited suitability for (my) common image editing needs. I.e. add a white text with black border to an image.
But these are my requirements. The developers don’t have to cater to them if they don’t want to. I in turn can decide to not use the program or add the features I would like to see myself (It’s the former for me).
That is the way it is.
Edit: The name gimp was never an issue for me. There are far worse.
Thank you for the clarification. These points are indeed very similar to my thoughts (but I wouldn’t have been able to describe it so to the point. )
I like to think I managed to represent the Musk-like interaction in my previous reply; responding to your well built message with a snarky comment. Although, I think, I went too far with the dual interpretations.
I didn’t get that. So this part needed some explaining for me.
Why is your reply being down-voted
Maybe it is because I missed the sarcasm/ humour in your response. It’s hard to know if it isn’t written down as a response. :)
I’m not sure what you mean. The act is the same but the intention of it differs imo. Do you want to elaborate on the topic?
Even partially resorbed earth crust/ ingrown nail? Maybe. :)
Good.
Now repeat it with an ingrown nail.
I think that he should have avoided the interaction with musk, if he planned to convince Musk of something.
If he planned to educate the general public, his approach is totally fine, though.
You might be confusing public IP addresses with ports?
I mean publicly addressable address like in: not in a private network where SNAT/ masquerading is in place between the torrent-client’s host and the Internet.
It was mentioned, that no port forwarding is in place.
Not sure why you would sometimes see your status as fully connectable
One side of the connection needs a public address, not both. When both parties don’t have a publicly addressable IP, the status is firewalled. I guess.
That’s a pyramid. (And an eleven-fingered Pythagoras depiction)
Oh wow, you’re riding the wave here.
To blow leaves.
Sharing is caring, George!
Yolocopter ;)