

1·
17 hours agoYou, kind sir, are giving me ideas…
You, kind sir, are giving me ideas…
Our window blinds at school had tiny holes in them for the strings to go through and they had the exact same effect. You could see the eclipse projected once the tables.
This crucification is sponsored by Nord VPN
Torx torx torx torx!
I use exclusively torx or tamper-proof torx for my projects and I love it so much.
Hey, I love getting sidetracked!
And that’s why I added a crontab entry that periodically purges my cron configuration. That way, I’m forced to readd only the truly necessary cron jobs, successfully reducing the amount of crontab entries.
If it’s alright with your threat model, you can put the time-based OTPs into your password manager of choice, like Bitwarden. Upon filling your username and password, it places your OTP in your clipboard, so that you can simply paste it in. This does of course reduce the security of the system slightly, since you centralize your passwords and your OTPs. When opting for this method, it is therefore imperative to protect your password manager even more, like via setting up 2FA for the password manager itself or making sure your account gets locked after something like 10 minutes of inactivity. The usability aspect is improved by using a yubikey or another similar physical key technology.