I wrote an algorithm that could detect top talker trends from network flows. At the time it could reliably work up to 40Gbps depending on flow sample rate and your definition of reliable.
Not sure if it’s in use anymore.
I wrote an algorithm that could detect top talker trends from network flows. At the time it could reliably work up to 40Gbps depending on flow sample rate and your definition of reliable.
Not sure if it’s in use anymore.
No idea, but it’s an easy thing to fix, so why not.
ChatGPT.
i recently started my job search, and asked it for a list of top 10 companies with recent funding announcements and remote work that fit my profile.
I expanded on this a few times, reached out to their career pages and recruitment. Landed 2 interviews and I’m in the final round for both. It took about 35 applications.
It also helped me tune my resume and cover letter. Be sure to put things through an AI detector to avoid being filtered out for sounding like AI
Gwar. I hate that kind of music tbh, but saw them at a festival and it was one of the best shows I’ve seen.


It’s a sophisticated scam where they take you for all you have.


Had a contractor working on my basement who fell for a pig butchering scam. Took him for 50k


Fail2ban is not a static security policy.
It’s a dynamic firewall. It ties logs to time boxed firewall rules.
You could auto ban any source that hits robots.txt on a Web server for 1h for instance. I’ve heard AI data scrapers actually use that to target big data rather than respect web server requests.


Meanwhile the tv will bombard you with wifi connection request modal popups. Lol


Dumb TVs exist, and they’re 5x the price of smart TVs.
Ads and data mining subsidizes the hardware cost. If you want cheap TVs you get spyware and ads.


Routing takes place on layer 3 (ip) so destinations are ip networks and hosts.
Each packet you create has a destination IP. Your computer looks at your route table to see where it goes by matching the destination ip with each network. It will be sent to the most specific match first and your default gateway last.
If you’re default gateway is you’re vpn server via your vpn interface then you just need to add more specific route for destinations of interest through a different gateway (you’re router) via the physical interface


Raw disk access is a privilege in Linux, usually reserved for root.
You could have root change the permissions on the directory to allow another user or group write access.


goes to Google, on the raw network, and on the VPN.
You can’t “go” to a destination on two networks in a single request. It’s all packets on a wire, if it comes from two sources, it was two requests.
Unless you mean two different requests. As in while on the VPN everything is tunneled, and while not on the VPN it’s not, but this is the opposite of what the OP was asking for. He wants the VPN on for some use cases, and off for others. That’s split tunneling.
He’ll likely wind up with difficulties around trying to figure out which destinations he doesn’t want routed through the VPN, because there’s no way to do it by protocol, since routing happens on layer 3, not 4 or 7. He’ll likely need to know those address in advance.


Interesting. There’s no difference in my dialect.
Told my wife and kids they can run whatever they want if they don’t involve me. If you want me to help with computer issues then I’m installing Linux.
If you don’t want that, you better learn how to computer because you’re on your own


Canadian with a shitty mobile keyboard, that’s all.


Swipe keyboard. It picks random yours, and I’m exhausted from flying all day so I didn’t proof read.


Yes that’s called routing.
You don’t bind it to a NIC, you specify the destinations you want forwarded to each interface. Your VPN connection is just another interface.
If you’re looking for good docs, you may want to Google split tunnel vpn, and also bone up on your networking.
A few static routes should get you what you need
Pass uses GPG and git under the hood.
You create keys to encrypt your data, and keep the encrypted data in git locally which can be cloned to github, gitlab and the like.
It’s just files on your computer, so you can back them up that way, or use a thumb drive as a remote git repo and push to it.
Day to day Type pass and tab complete to find the entry. Enter the command and be prompted to unlock it. It will then print the credentials to the terminal.
To create a new password, you type and add command followed by a name and a text editor opens up for you to type credentials in, or it can generate them for you.
To keep your backup up to date you just git push to the remote of your choice. I use github
I’ve been running only Linux for 25 years. Any software you think you need that you only can get on Windows you don’t. Drop windows, say goodbye to your apps, and explore the alternatives. Try to have fun. A growth mindset helps