Using -F with tail is even better than -f because it handles files getting truncated or getting created.
Using -F with tail is even better than -f because it handles files getting truncated or getting created.
Exactly! This is why the server should just send a clear error message. 99% of the time the client just wants to show the error message to the end user, and not have to wrangle all kinds of normalized data into one.
This looks so over-engineered. Most of the time you only need an error message. Make the message clear enough so that it can be shown to the end user.
Everyone in this thread: PHP sucks because it was bad when I last used it 20 years ago.
Those haven’t existed in PHP anymore for a very long time.
Well better late than never.
Thats what the firewall rules do too, don’t allow internet connection if there’s no vpn connection.
Firewall is a system-wide solution that always works, while qbt config relies heavily on the application implementing interface binding properly. Which it doesn’t fully btw.
Better to just configure a firewall properly so that no packets can go outside of the vpn tunnel.
That’s a totally different point though, on which I agree.
There’s no reason to self-backdoor the authentication mechanism if you already have access to the account’s data. Also it sounds like you are very smart.
Or listening to an audio book and reading the book at the same time, but then often there’s the case where one is a different version than the other.
Even this week I still had the issue where I couldn’t decrypt messages in Element on android.
Yeah it’s truly a shame almost no site other than google and github support hardware security keys.
For your case you would probably want a yubikey 5c and then a usb c to usb a adapter yeah. I wish for a usb a and c and nfc as well.
I wish all sites using 2FA would just support hardware keys instead of authenticator apps. It’s so much easier to login to a site by just plugging in my hardware key and tapping its button, than going to my authenticator app and typing over some code within a certain time.
It’s even sinpler than email 2fa or sms 2fa or vendor app 2fa.
For authenticator app you also can’t easily add more devices unless you share the database which is bad for security. For hardware security key you can just add the key as an additional 2fa, if the site allows it.
Cock and ball torture then?
Be careful, the actual logging can happen at a later time, and because the log function may take a reference to the value, if you modify r it may show the modified version of r in the logging instead of the original r.