Well. 2-level tab stacking with compact display style is… broken, unless a non-stacked tab is selected.
And they moved the panel button from the status bar. Stupid. Anyway, I've moved it back.
141 publicly visible posts • joined 15 Jan 2013
I've done much the same with the one smart TV in this house. It has access to the LAN so that it can see any local media servers which I may have running.
Not that that's particularly useful since the media which I exported from VDR and which I'm serving via minidlna it doesn't cope with all that well, often dropping audio at any point where I happen to have cut out adverts…
That's… awkward to read because of the fact that your browser window was too wide.
Regardless, once you've ruled out local cabling etc., that's TalkBork's problem to fix. They're currently in the process of testing a new network, so (assuming that your problem isn't entirely between you and the cab or exchange) you should see some improvements when they roll that out for everybody.
Assuming that I've somehow become the owner of a computer with Windows 10 installed for the moment (har har), if that option were removed, I'd expect Micro$ith to pay for its use of my 'net connection at peak times. (Yes, it's metered and yes, the effective cost is higher during office hours.)
In the absence of hardened phones, I'd use ones which get regular security updates. My understanding is that this limits it to Google Nexus/Pixel and Apple. (I could well be wrong here, but somehow I doubt it.)
I should think that most of us only see the free services provided by Google (I have no experience of Apple in this respect, so I won't comment on that). I've not seen Google's business offerings; but since they cost actual money, I would expect a corresponding lack of information gathering for advertising etc.
I should mention that, for advertising, it's not the information which is sold (that would have huge ethical, not to mention legal, problems); what they sell is a service: matching up adverts to users and actually serving the adverts to those users. But keep thinking that they sell the actual info if it helps.
Missing the point somewhat.
Those parts which are open source, ship as source code.
Those parts which are proprietary, ship as blobs ready for linking or executing, as appropriate.
Make sure that those who choose to rebuild the software can usefully do so, i.e. don't just do a raw code dump without any hint as to how to recompile it all. Makefiles, build scripts, build requirements.
I've seen some labelled “IPv6 ready”. Unforunately, that looked just a little too much like televisions labelled as “HD Ready”, and as I didn't need anything like that at the time…
(The one which I'm using isn't claimed to be IPv6-ready. I'm only actually using it as switch and AP anyway as I usually find that these things are insufficiently configurable, particularly in the firewall department.)
Last time I looked at those available via the likes of PC World (okay, sample size of one, and a few years ago), they relied on IPv4 and if they supported IPv6 at all, it was either via 6to4 gateways or instead of IPv4. Which is not much use with ISPs such as the aforementioned less-cheap more-techy one.
Has the situation changed much?
Tabs for block indentation. Spaces (after the block indent) for indentation within a multi-line statement. That way, you get the flexibility of however wide you want your tabs to be today without messing up intra-statement alignment.
Two-space indents? Been there, done that. Was useful where I used it.
Now, the pet hate: people using four spaces just because the tabs happen to look like four spaces. I normally have tabs set to every 8th column, but I will sometimes switch to every 4th. That shows quite nicely where the bad indentation is.
I've seen similar behaviour. In such situations, one very good thing to do is to log the input from the offending device; in my case, it showed clearly that the mouse had some… slightly odd behaviour in that, for certain buttons, it wouldn't indicate that the button was released until it was next pressed, which (of course) immediately triggered another button press event. That one got fixed in the kernel via the HID quirks mechanism such that the kernel will generate fake release events for the affected buttons, making them effectively instant-release as far as userland is concerned.
That headset sounds like it has the same issue; and the workaround which you found was probably a key combination which sent XF86Ungrab or XF86ClearGrab or similar.
Barcode Scanner reads the QR code and, if the content is a URL, does an HTTP GET. It'll show appropriate information, if any – target URL (in the case that a 301 or 302 response was received) or the page title. Useful, but not quite ideal (could be a large amount of data being returned).
Whut? You'd actually want CGNAT? I'll take a public IPv4 address, NAT that locally (as you'd do anyway, unless you should happen to have enough!) and an IPv6 block or 65536.
Incoming traffic gets firewalled (with holes as needed); and should there be an incoming DDoS, I expect my ISP to take care of blocking it. Regarding linking a domain with an IP address ‒ well, the IP address doesn't offer that correlation. DNS does.
I'm using a 'net connection for which download cost varies by time of day (and which day it is too). Were Windows 10 an issue here (it isn't, there being no machines to be updated to it) and I couldn't schedule the download for the cheapest part of the day, I'd be complaining publicly about it and billing Microsith for the extra data costs (unless I could successfully defer the download by temporarily blocking access to the update servers).
Quoting from squid.conf:
SECURITY NOTE:
As described in CVE-2009-0801 when the Host: header alone is used to determine the destination of a request it becomes trivial for malicious scripts on remote websites to bypass browser same-origin security policy and sandboxing protections.
The cause of this is that such applets are allowed to perform their own HTTP stack, in which case the same-origin policy of the browser sandbox only verifies that the applet tries to contact the same IP as from where it was loaded at the IP level. The Host: header may be different from the connected IP and approved origin.
This new reported vulnerability sounds… rather similar, and very much related.
(Also, “two complementary and inter-dependent parts”, unless they're saying nice things about each other…)
Full-screen, sudden, in-your-face advertising on phones with click-on-this-pixel-to-dismiss – give them feedback. Complain. Tell them that it's annoying, intrusive, hard to dismiss without accidentally clicking on it at least twice and, consequently, it's driving you away from their site.
It's not long since that I complained to The Independent about one such. I didn't bother reading the rest of the article (and I did mention that I'd given up trying to read it due to advertising) and haven't visited The Ad-Dependent's site since.