That looks like cellulose insulation, little guy should be fine. That said, I hope someone has enough respect for you some day to do the right thing and let you know a rodent is destroying your property unimpeded. They can literally cause thousands of dollars in damage if left unchecked, and there are numerous other things that can kill or hurt him within the home that he now has access to.
Good on you for looking out for em though, seriously.
Agreed, it’s easier to jump back into those games, too. One thing I hate is picking a game back up after a week and spending the first 20mins figuring out what I was doing last time.
After reading the article, I came away with the opinion that we should be doing away with all of the pageantry of holiday gatherings, and focus instead on the connections we’re tying to maintain.
But that’s really the thrust of the article, isn’t it? The fact that so many men seem to not care about the appearance and presentation is the problem in their eyes.
Newer OLEDs are also far less susceptible to burn in than older generations, I think much of the concern is still stigma from earlier models.
With that said, I’m sure I am not alone in saying I have a rather old OLED that I’ve just used as a normal every day monitor and haven’t experienced any issues in the 6+ years I’ve had it.
Yeah, if you use your own password cipher, you never have to memorize a password again. Just derive it based on some common input value, like the company name or url. Makes password rotation tricky, though, and it’s a pain when a website won’t allow a special character you generally use, creating “one offs” that are hard to track.
That makes sense! Believe it or not it’s actually easier for an ISP to block a whole country than select websites and services. We actually null route all Russian public IP space where I work, that would absolutely be plausible on a national scale as well.
It’s imperfect, you can get around it, but it catches 99% of normal users, which is the goal.
You are absolutely correct, I should have lead with that. Encrypted client handshake means no one can see what certificate you are trying to request from the remote end of your connection, even your ISP.
However, It’s worth noting though that if I am your ISP and I see you connecting to say public IP 8.8.8.8 over https (443) I don’t need to see the SNI flag to know you’re accessing something at Google.
First, I have a list of IP addresses of known blocked sites, I will just drop any traffic destined to that address, no other magic needed.
Second, if you target an IP that isn’t blocked outright, and I can’t see your SNI flag, I can still try to reverse lookup the IP myself and perform a block on your connection if the returned record matches a restricted pattern, say google.com.
VPN gets around all of these problems, provided you egress somewhere less restrictive.
Yeah, even if they miss your DNS request, the ISP can still do a reverse lookup on the destination IP you’re attempting to connect to and just drop the traffic silently. That is pretty rare though, at least in US, mainly because It costs money to enforce restrictions like that at scale, which means blocking things isn’t profitable. However, slurping up your DNS requests can allow them to feed you false error pages, littered with profitable ads, all under the guies of enforcing copyright protections.
Most ISP blocking is pretty superficial, usually just at the DNS level, you should be fine in the vast majority of cases. While parsing for the SNI flag on the client hello is technically possible, it’s computationally expensive at scale, and generally avoided outside of enterprise networks.