In Australia we call them Seppos.
Yank > Septic Tank > Seppo.
It also works in that they’re both full of shit.
In Australia we call them Seppos.
Yank > Septic Tank > Seppo.
It also works in that they’re both full of shit.


I don’t condone what happened to Charlie Kirk, but Charlie Kirk condoned what happened to Charlie Kirk.
You drive a vehicle with a manual transmission.
You steer a vehicle with an automatic.
It’s IPv10, which binds IPv4 and IPv6 together (4+6=10), sometimes known as Dual Stack.


Financial obesity is a large part of capitalism, but it’s by no means exclusive to it. Replacing capitalism with anything that tolerates obscene wealth accumulation would be a categorical failure.


Financial obesity is an existential threat to any society that tolerates it, and needs to cease being celebrated, rewarded, and positioned as an aspirational goal.


The goal today isn’t to make single stack IPv6 internet practical, it’s to make dual stack ubiquitous. Once that’s achieved, the cost differential, and the increasing technical burden of maintaining IPv4 hacks, will reach a tipping point where it’s relegated to legacy status, but this is at least a decade away, with likely another decade of inertial decay of public IPv4 after that.
The cloud is, and always has been, merely other people’s computers.
Their only legitimate use case is as disposable, transient, dumb nodes and synapses of a system you retain control and agency of.
The reason IPv6 was originally added to the DOCSIS specs, over 20 years ago, is because Comcast literally exhausted all RFC1918 addresses on their modem management networks.
My favourite feature of IPv6 is networks, and hosts therein, can have multiple prefixes and addresses as a core function. I use it to expose local functions on only ULA addresses, but provide locked down public access when and where needed. Access separation is handled at the IP stack, with IPv4 it’s expected to be handled by a firewall or equivalent.
No one who legitimately knows anything about computing speaks like this.
He’s truly a moron’s hallucination of a genius.
Every number system is base 10.
Binary is base 1+1.
Ternary is base 2+1.
Octal is base 7+1.
Decimal is base 9+1.
Duodecimal is base B+1.
Hexadecimal is base F+1.
I remember when this applied to 8kB.


The Hippocratic oath is far too frequently interpreted as a mandate to unilaterally inflict life as broadly and indiscriminately as possible.


Either she knows something novel, where processing data using voice coils is somehow beneficial, or is someone who calls their computer a ‘hard drive’, which summarily negates any legitimacy of technical competence.


I’ve recently seen login attempts using keys, found it curious…


Permitting inbound SSH attempts, but disallowing actual logins, is an effective strategy to identify compromised hosts in real-time.
The origin address of any login attempt is betraying it shouldn’t be trusted, and be fed into tarpits and block lists.


Maybe this already exists, but what about a feature which allows tagging a post as a link to a previous/original post, which can be used by clients to filter out reposts if desired.
Not Linux, but VMS is specifically designed to run on VAX systems.
Pachygaea.