• 0 Posts
  • 101 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle
  • 404 is a web server response suggesting that a web server is up. It’s what’s giving 404.

    The web server can’t find your page or document or resource. So one of your web servers (on either the reverse proxy or the actual server) is pointing to the wrong spot on what to serve.

    You haven’t tried launching a wrong server on the same port right? Or misconfigured your nginx translation?

    Isolate the issue. Ignore nginx and start testing just the web server on the destination and see if the server is giving 404 and then if it is giving the right document then it’s nginx configuration. If it’s not giving you the document nginx can’t serve.

    But either way start isolating the problem into the smallest area. And focus on the configurations and files that are related to it.


  • People like to conflate two problems together.

    Lots of Australia is small and far away from metropolis.

    Lots of metropolis could happily exist with wonderful multi modal transport options like trains bus bike and walking.

    Between the two, cars grant autonomy outside public planning for individuals to still be individuals to get between families and economy between remote to remote and metro to remote even when there’s no feasible public transport.

    The devil in the detail is the problem at it always is anything when you look into it.

    Yes there’s big opportunity to improve mass transit. Yes there’s a place for long range individual and small scale transit. Yes there’s a place for last mile delivery.

    But the average Joe doesn’t really and shouldn’t really need to know, or care. Why does it take a nation, that is every individual, to understand and vote for what is nuanced and specific? Why can’t bold moves be made and results be explained?

    Anyway that’s enough drunk reply








  • I don’t know where you work but don’t access your tailnet from a work device and ideally not their network.

    Speaking to roku, you could buy a cheap raspberri pi and usb network port. One port to the network the other to roku. The pi can have a tailscale advertised network to the roku, and the roku probably needs nothing since everything is upstream including private tailscale 100.x.y.z networks which will be captured by your device in the middle raspberri pi.

    I guess that’d cost like 40 ish dollars one time.








  • Tbf not that hard to increase waste by 25%. Just think of how a new staff takes a long time to do easy work, causes rework, and generally sucks up the time of the people around them until they get the experience and skills they need to do that job.

    That’s the micro scale, but in a macro scale it’s the same. Cause more waste, and not only will the money matter less, the public interest will be deteriorated and the entire foundation compromised.

    Actually just check out the history of CIA ops around in foreign countries. Consider how many of those countries end up with a high inflation rate and that currency becomes more worthless in a deathspiral.

    I think it’s not a single factor like “it’s orchestrated by state nation x” but I fully believe if the US is going to make itself weak then those countries like potentially Russia or China will take full advantage of it and offer a helping push. They’ll do it subtly. So it’s hard to see. But it’s just standard politics, and it would be insane to think they won’t take full advantage of a situation.


  • biscuitswalrus@aussie.zonetoProgrammer Humor@programming.devSafe passwords
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    5 months ago

    Enterprise applications are often developed by the most “quick, ship this feature” form of developers on the world. Unless the client is paying for the development a quick look at the sql table shows often unsalted passwords in a table.

    I’ve seen this in construction, medical, recruitment and other industries.

    Until cyber security requires code auditing for handling and maintaining PII as law, mostly its a “you’re fine until you get breached” approach. Even things like ACSC Australia cyber security centre, has limited guidelines. Practically worthless. At most they suggest having MFA for Web facing services. Most cyber security insurers have something but it’s also practically self reported. No proof. So if someone gets breached because someone left everyone’s passwords in a table, largely unguarded, the world becomes a worse place and the list of user names and passwords on haveibeenpwned grows.

    Edit: if a client pays and therefore has control to determine things like code auditing and security auditing etc as well as saml etc etc, then it’s something else. But say in the construction industry I’ve seen the same garbage tier software used at 12 different companies, warts and all. The developer is semi local to Australia ignoring the offshore developers…




  • Thank you, I wouldn’t have chucked this onto a watch later without you specifically noting it wasn’t a FJ video.

    Tbh I didn’t think fj would be disliked around here. I’m personally of the opinion that he’s a dochebag and I won’t really watch him. But he’ll take on a fight and publicise problems that should be brought to light. But like any comedian, his job is entertainment and he doesn’t entertain me.

    I assume I’ve just missed some scandals. As opposed to my shallow depth dislike of him as a human from internet vibes.