It uses a security feature of Linux called cgroups or control groups to limit access to resources at a kernel level.
It’s used all over the place, including as the basis of Docker.
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork
It uses a security feature of Linux called cgroups or control groups to limit access to resources at a kernel level.
It’s used all over the place, including as the basis of Docker.
Wait until you see our dropbears. .
There’s a common but persistent misconception that Docker is like running a virtual machine. This is understandable but incorrect.
A better way to think of it is as a security wrapper around an untrusted process.
If you look at your running processes whilst a container is running, you’ll see the processes inside the container running on your “host” machine - remember, it’s not a host - guest situation.
There is no relationship between the user inside the container, unless you start mapping the UID and GID.
The only exception to this is the root user which shares the UID/GID with the actual root user.
See: https://www.howtogeek.com/devops/why-processes-in-docker-containers-shouldnt-run-as-root/
Edit: I suspect, but don’t know for sure, that the root user inside the container is actually the same user as the one running the Docker process, which is typically the root user on the “host”.
See: https://www.docker.com/blog/understanding-the-docker-user-instruction/
Stayin’ Alive - Bee Gees
… and this is why we use YYYY-MM-DD as the date format.
Did you actually read the article you posted?
Not in the Philippines, but what is now Indonesia.
The comments here seem to be missing a salient point.
In order to determine if a user is under 16, you need to determine that for every single user … including you!
This means that your personal data will be harvested in order to determine if you are over 16 or not.
I think all public funds that generate data and/or software needs to be public.
The notion that maintenance is an issue is a red herring. Proprietary software purchased by government requires ongoing support contracts right until the vendor discontinues the product and leaves the public funds to prop up another billionaire.
Open source would also stimulate the economy since businesses could benefit from the project and use or apply it to their use, something which currently requires more investment with the same vendor.
So … you are basing you hypothesis on an article about Pedophile hunters written in German (or Swiss if you want to get frisky) that you linked using an English headline and summary in a software development community?
I’m surprised that your post wasn’t removed.
I’m mentioning this because it hardly seems like a genuine attempt to learn anything and any assertions you make about voting behaviour has to be suspect at best, not to mention that it’s based on a single example, hardly ever the hallmark of solid statistical analysis.
Let’s move on to the attempted “fix”.
You’re attempting to achieve what exactly?
A relationship between votes and comments?
How do you know how the users decide what to read, vote or comment on? You see a relationship with ordering by votes, I read whatever comes past on my “All feed” and vote when I think the pod warrants it. The two are not the same.
In other words, your proposal seems based on a very poor foundation and I’m voting accordingly.
It’s still happening today - warning disturbing content.
And there’s this legal aspect to the affair:
The open-source alternative to Mailchimp, Brevo, Mailjet, Listmonk, Mailerlite, and Klaviyo, Loop.so, etc.
That’s the first paragraph of the project page.
Not to rain on the parade, but in my experience, having had to email customers in bulk … sending tickets and logistics requirements for large events … I can tell you that self hosting this is a complete and utter waste of time.
You’ll get blocked before the first batch of emails leave your mailer.
Not even paid MailChimp or Campaign Monitor could guarantee delivery.
The problem is not the platform for sending email, it’s the centralised nature of email hosting, much of it is behind Google and Microsoft hosted services.
But imagine the commit log.
This cat is reminding you that every time you smoke a kitten dies.
Catch up on sleep.
Docker is not virtualisation, although it’s a common misconception.
A better way to think of it is a security wrapper around untrusted processes.
You can prove this for yourself by looking at all the processes running in a Docker host while one or more containers are running, you’ll see all the processes listed.
In other words, you don’t need a CPU capable of virtualisation to run Docker.
My “smart” phone is rarely used as a telephone. It’s set to silent, all notifications turned off, blocks unknown numbers, transcribes voicemail and spends most of the day as a window to the world.
I’m not sure what, if anything, a “dumb” phone would add to my life, except more interruption, more administration to keep contacts up to date, and yet another device to charge and maintain.
Who can see?
My observation was based on personal experience after noticing that an account blocked me.
Embrace, Extend, Extinguish (Exterminate)
https://en.wikipedia.org/wiki/Embrace,_extend,_and_extinguish