Tabs are just bookmarks for people who can afford RAM.
Tabs are just bookmarks for people who can afford RAM.
He’s missing the sigh() function call at the start of the main body of the loop.
That is exactly what happens. Encryption on the protocol doesn’t do anything but hide what you’re downloading from your ISP. It doesn’t prevent someone from downloading the same torrent and matching your IP to it. That’s why people recommend that you use VPNs if you’re going to do this from your house.
Great post, one of my few saved posts
Wow, I haven’t used the old school P2P programs in over a decade. I honestly didn’t think they existed anymore for some reason.
yt-dlp
It supports YouTube playlists also, so you can just give it a massive playlist and let it go
It’s been ages since I did IT. If I had a user who wanted to run Linux then I knew that, on average, they were going to cause me a lot less headaches with random user issues so I wouldn’t mind being flexible. Endpoint security will be different, but a lot of network security is handled through network devices that don’t care what the client is.
Noticing a lot of suspicious activity coming from there…
I just mount a tablet in front of my radio and ignore all of the infotainment ‘features’. It’s just a bluetooth audio device.
Same thing with smartTVs, just ignore all of the ‘features’ trying to lure you into the data harvesting ecosystem and treat it as a dumb monitor.