

You can use both at the same time and it is useful to have ULA if your ISP changes your assigned prefix.


You can use both at the same time and it is useful to have ULA if your ISP changes your assigned prefix.


BIOS menus aren’t the only way to adjust fan speeds on servers. You may be able to do it from Linux using a management interface.


Why RIP? It’s still alive.


This isn’t new. Even before AI, failing companies would use layoffs as a sort of loan on their quarterly numbers. If you lay off your employees, you’re really profitable for as long as you can continue collecting money for the work the employees had already done.


The writers interviewed did use AI but don’t want to get caught so they edit imperfections into the AI’s output. They’re just trying to fool the detectors.


Setting the SSH service to a random high port doesn’t make security better and may make security worse. Linux has a restriction that low numbered ports require special permissions but high numbered ports do not. If an attacker manages to get low privilege code execution on your machine, they may manage to bind their service to the SSH port instead. If the server and client are configured correctly, this will cause a host key mismatch error. Continuing anyway could allow the attacker to take over your account on the server. It’s unlikely unless you are a high value target.


Root login and password authentication are already disabled, and it’s very uncommon for self hosters to use SSH certificates at all.
Changing the SSH port away from 22 does not improve security unless your password is “password” or “admin”. Anybody who’s even slightly sophisticated will find your SSH service on the correct port and make requests there instead.


Phishing campaign authors will love this. It normalizes users scanning barcodes they can’t read to go to unknown locations on a device where it’s harder to see the URL and there’s no IT watching for phishing activity.


Is this a real question or is this an AI generated ad story?


This time is different. As in literally the time is different. It’s May 2026 now and this is a new illegal order.


This problem has nothing to do with NPM. Checkmarx was compromised last month, and during that compromise there were malicious VS Code extensions published to Visual Studio Code Marketplace. A Bitwarden developer says that somebody ran one of those malicious extensions, and GitHub API keys were stolen which were used in publishing the malicious CLI package.
It’s probably better that it happened on NPM. If the CLI were only downloadable from the Bitwarden website, it would have likely taken longer for somebody to notice something was wrong.


For people who didn’t grow up in America, it may be surprising to read about JROTC. It’s a pre-military program you can take instead of regular high school classes.


I’ve never heard of anything working that way. The preferred algorithm is RFC 8305 “Happy Eyeballs,” which uses whichever network responds first. Even if your clients prefer IPv4, having IPv6 available allows you to access some resources that are not available over IPv4.


Matter uses IPv6 but it does not require you to have IPv6 internet. As long as the router isn’t blocking IPv6 router advertisements and IPv6 traffic between devices in your LAN you should be okay.


I already switched to Immich. It’s pretty good at finding pictures, it doesn’t require a subscription, and it isn’t Google.


Is that what his head looks like under his hair?


Is Bitcoin really a good idea? bitcoin.com says you shouldn’t worry because it would cost “hundreds of millions to over a billion dollars” to run a 51% attack on the Bitcoin network for an hour. The US government spends this kind of money on wars, and likely has the means to reduce that cost by forcing offline or compromising a large portion of the trustworthy Bitcoin network. This alone wouldn’t allow money to be seized, but it could be used to destroy the crypto market, making that money effectively worthless. You wouldn’t normally need to worry about an attack of this scale, but the it’s not beneath this government and there are a few AI companies that could use a government bailout in exchange for temporarily converting all their GPUs to Bitcoin miners.
Does World War III involve different countries attacking and defending crypto currencies?


My old phone was constantly recommending that I send YouTube videos with spy query parameters to the e-mail address of a dead relative instead of Untracker. It’s like they designed the system to push users towards doing what they want users to do instead of helping users do what users want to do.


I have to use a Mac and I can confidently say that the experience of using a Mac has not gotten better every year. It just doesn’t get worse as quickly as Windows. It may be true that Apple Silicon has gotten better every year, but so has AMD.
This looks more comprehensive than Untracker, but maybe it is too complicated for some people?