SAS connection - https://cdn.shopify.com/s/files/1/0006/3029/2540/files/SAS_SATA_text_2_1024x1024.png?v=1604503325
You can connect a SATA drive to a SAS cable, but not a SAS drive to a SATA cable.
I just want to add that Signal is not associated with Facebook. WhatsApp is, but uses the Signal protocol. The creator of Signal actually worked with them to make sure they implemented it correctly. I totally get the aversion from anything Facebook related, but Signal itself, isn’t.
You’re awesome. Thank you!
I would like the full res for wallpaper use.
The login issues seems to have been fixed with the recent update.
https://join-lemmy.org/news/2023-07-11_-_Lemmy_Release_v0.18.2
Have your tried clearing your cookies/cache for your browser and logging in? For your mobile app, remove your account from the app or clear the cache in the app settings.
I’ll give you not being able to buy SIMs without an ID; I didn’t know that. But the rest is not as accurate. You should probably just not use a computer or phone to ensure complete security.
What are you talking about? I mean trust in the sense of doing the right thing from a security aspect. Maybe whoever is setting up the server isn’t as adept with security and doesn’t do all that is required.
A router or firewall by default will block incoming traffic from the internet; it only allows outgoing traffic. So a computer simply being connected to the network shouldn’t just all of a sudden get a virus or malware. Users browsing not safe websites, downloading random things, opening random email attachments, or installing unsafe applications will cause the compromise.
However, port forwarding will open a port on your router/firewall to allow incoming traffic to whatever device you’ve forwarded that traffic to. SSH itself is not really the concern, but the strength of the password used for the account.
The internet is constantly being scanned by bots looking for easy targets. Even if you change the default SSH port to something else, it will eventually be discovered and if your server/device responds in such a way to reveal it’s an SSH server, then whatever automated system will start trying common usernames and passwords to get in (brute force).
If you were going to expose SSH, it’s best to change the default port, use an uncommon username (not root, admin, pi, etc.) and don’t accept connections from anything other than that username, use key based authentication, and probably install Fail2Ban to block brute force attempts. And if you are only going to be connecting from a known source, like your work, maybe just allow that IP with your port forward.
I suppose. You’re still putting trust into something. To make sure they’re doing the right thing and making the right decisions in regards to security and privacy, and that they wouldn’t be pressured by a government or third-party to violate that.
I see your point, but what threat and their level of sophistication are you trying to avoid? The number is used just for registration. You can get a burner phone if you’re worried about sharing your number.
Wouldn’t you have to trust that they’re not logging your IP and/or storing your messages?
Signal doesn’t store your contacts or messages; it’s end to end encryption. What are you suggesting they’ll “sell out” if offered enough money?
I actually tried that and it moved a little, then stopped.
Ah ok. So not as simple as I imagined it to be. I’ll stick with the boost converter. haha
Forgot the attachment?