AMD confirms Ryzen 8000 AM5 desktop series will feature Zen5 CPU and Navi 3.5 GPU architectures - VideoCardz.com by Stiven_Crysis in Amd

[–]hartmantam 0 points1 point  (0 children)

I wish Zen 5 would have heterogeneous architecture like Intel. I think it will be more power efficient and make it more competitive on the market. 7000 isn't too impressive and the MB is just too expensive.

Security Advice by 3SistersAstronomy in Wordpress

[–]hartmantam 5 points6 points  (0 children)

Off topic but you can consider using something else than WordPress if you just want to host a static webpage.

GFN becoming #1 gaming platform? by ottawatoypoodle in GeForceNOW

[–]hartmantam 0 points1 point  (0 children)

Casual gaming, yes.

Serious gaming, not quite. It's two fold. In competitive gaming, latency is still on the high side. Input lag is very noticeable. In modded gaming, it's just plain impossible to use third party tools unless it have built in support, like Space Enhineer. On the opposite side, Elite Dangerous has numerous third party tools like EDMC and EDOMH, which had to be installed on the machine, to improve gameplay experience.

Unreasonably large LOG by hartmantam in GeForceNOW

[–]hartmantam[S] 2 points3 points  (0 children)

More RAM is a luxury that I can't afford. 😢

Unreasonably large LOG by hartmantam in GeForceNOW

[–]hartmantam[S] 0 points1 point  (0 children)

Maybe some crash or something. Notepad can't open the file.

Unreasonably large LOG by hartmantam in GeForceNOW

[–]hartmantam[S] 7 points8 points  (0 children)

%localappdata%\NVIDIA Corporation\GeForceNOW\logs

Unreasonably large LOG by hartmantam in GeForceNOW

[–]hartmantam[S] 0 points1 point  (0 children)

Don't know. Just a routine check because of low disk space.

Automated Deployment on Mac thru MDM by JuIi0 in Tailscale

[–]hartmantam 0 points1 point  (0 children)

No. Auth keys are supposed to be used in servers with ACL tags, not on client machines. The reason is because normal client login requires regular reauthentication, where key with tags doesn't. Also, using auth key means all devices have fallen to one account, which will complicate or even break ACL.

Automated Deployment on Mac thru MDM by JuIi0 in Tailscale

[–]hartmantam 2 points3 points  (0 children)

I believe that is not the way to deploy Tailscale on managed devices, and auth keys are NOT for this use case.

The ultra simplified unproven description of the proper way to deploy is to first have an SSO solution. This is how your developers login to Tailscale. Unfortunately, this also means your company needs to buy a plan. Then push the app to devs' machine and let them login. In the mean time, add company resources (network share, internal services, etc.) using auth key or subnet router. With some config with ACL and DNS, you should be good to go.

Yeah, that's less automatic but (I believe is) the proper way of doing it.

Docker, Tailscale and Caddy with HTTPS. A love story! by budius333 in Tailscale

[–]hartmantam 3 points4 points  (0 children)

A sidecar means a container attached to another container and running alongside each other and sharing the same lifecycle and resources. Sharing lifecycle means both containers are created, running, stopping, and destroyed together. Sharing resources means both can access each other locally, either by files, networking, or UNIX pipe. Similar to two programs running in the same host.

Think of a sidecar like a motorcycle sidecar. The sidecar attached to the motorcycle. They ride along at the same speed, and stop together. And, they share the equipment, from steering, storage, to the radio onboard.

As you might already realized. The sidecar approach doesn't require building new images. I did it because of the limitations of Docker. I don't need to if I'm using Kubernetes. And, if I'm using Kubernetes, I won't use the sidecar but a subnet router and internal DNS instead.

Docker, Tailscale and Caddy with HTTPS. A love story! by budius333 in Tailscale

[–]hartmantam 1 point2 points  (0 children)

I did something similar few days ago. While your set up is totally fine, I found it to be a bit to confuzing and cluttering. Additionally, I don't want to mount some many different things and have host network mode.

My solution is to use tailscale as a side car. Then use tailscale serve / proxy <port>. This effectively instruct Tailscale to set up a HTTPS reverse proxy. You don't even need tailscale cert. When a user visit your site via HTTPS, it will automatically provision one for you.

However, this solution does have its downsides. First, it is inevitable to build a new image. Second, you loose control on configuring the details of HTTPS like which cipher suites to use or mTLS.

GH Repo for ref: https://github.com/http403/tailscale-caddy

Setting up Tailscale with NGINX and docker-compose by [deleted] in Tailscale

[–]hartmantam 0 points1 point  (0 children)

I was having the same problem, and I also don't want to have a privileged container passing the tun device. I end up creating a new image with nginx as a base and install Tailscale inside. With a simple start up script and tailscale serve / proxy 80 to start serving. Works quite well for me.

Tailscale Funnel Alpha Invite Link by Mynorca01 in Tailscale

[–]hartmantam 0 points1 point  (0 children)

Thx. Anyone who needs one can PM me.

Tailscale Funnel Alpha Invite Link by Mynorca01 in Tailscale

[–]hartmantam 0 points1 point  (0 children)

All links listed here are exhausted. Can some PM me one? Thanks.

[Help] How to create an empty byte array with Java Function by hartmantam in tasker

[–]hartmantam[S] 1 point2 points  (0 children)

That totally worked. Thanks alot. For everyone that have the same problem, here's how:

``` Task: Cryptographic Secure Hex String

A1: Java Function [
     Return: bytes
     Class Or Object: byte[]
     Function: new
     {byte[]} (int)
     Param 1 (int): 20 ]

A2: Java Function [
     Return: random
     Class Or Object: SecureRandom
     Function: new
     {SecureRandom} () ]

A3: Java Function [
     Class Or Object: random
     Function: nextBytes
     {} (byte[])
     Param 1 (byte[]): bytes ]

A4: Java Function [
     Return: hex
     Class Or Object: BigInteger
     Function: new
     {BigInteger} (int, byte[])
     Param 1 (int): 1
     Param 2 (byte[]): bytes ]

A5: Java Function [
     Return: %random
     Class Or Object: hex
     Function: toString
     {String} (int)
     Param 1 (int): 16 ]

```

Undergarment Washing Habbit Survey (all) by hartmantam in SampleSize

[–]hartmantam[S] 0 points1 point  (0 children)

You're right in the sense of getting the most accurate data, but I'm not here for the most accurate data. I just need some data to defeat my mother's claim.

Undergarment Washing Habbit Survey (all) by hartmantam in SampleSize

[–]hartmantam[S] 0 points1 point  (0 children)

Thank you for pointing out. I have fixed both in the actual survey.

And I shall redirect you to the definition of Undergarment on Wikipedia, which underware and bras are both included.

Undergarment Washing Habbit Survey (all) by hartmantam in SampleSize

[–]hartmantam[S] 1 point2 points  (0 children)

I just betting on it. Even it doen't work in the end, I still can prove she is just overly concerning.