

Greylog is a syslog aggregator that might do what you’re looking for.


Greylog is a syslog aggregator that might do what you’re looking for.


I’d only have two nickels, but…


And here we’re afforded a rare treat, to observe the elusive trouser trout in its native habitat.


It would for all the financial industry that refuses to move to a real 2 factor system.


ICE, on the other hand, we send them to do all manner of things outside the US.


I don’t remember what I was downloading the other day, but I ended up on SourceForge. I forgot that existed too. Don’t visit without an ad blocker though.


This already been solved by public key cryptography? Sign the video with your private key, and publish the public key. Anyone can prove that the video is valid. To prove that the public key is valid, anyone can encrypt a message with it and asked for verification.


The exception here would be ESP32 devices. These have been some of the most reliable devices in my home and the most versatile, no Internet access required. Zigbee works well, but runs in the same frequency space as wifi and Bluetooth. Matter and thread are the new hotness and run in that space too. They all work well together, but something to consider. Z Wave is in a separate frequency space, but is a less open protocol. I have at least a few of all of these and they all play nice. Consider your priorities and choose what’s best for your application.


Can’t get to court if they murder you in the street


Well now I feel like I have to try them.


They certainly can, law enforcement isn’t a protected class. It might be bad for business, but nothing is stopping anyone from denying service to LEOs


This was my biggest miss too. The porn industry had predicted the winner in all of the previous format wars, so when it settled on HD-DVD I thought that was the end of it.


We shall say AI to you again if you do not appease us.
Dude, nostalgia rush. Thank you.


Or remarkably good-looking?


It was just a plane or something


I love unboxing some new tech, but why an access point specifically?
Security by obscurity is no security at all. If you can’t publish the details of a system and have it still work, it was never secure in the first place.