So in etwa?
wink
So in etwa?
wink
I like your pitch black humour.
https://www.adfc.de/artikel/den-regeln-der-stvo-folgen
In principle, cyclists may choose whether to turn left directly or indirectly.
When turning directly left, cyclists may also leave cycle paths that are subject to mandatory use in order to turn directly left, but must pay attention to straight ahead traffic, which has the right of way. If you want to turn directly left, get into the middle of the lane in good time and follow the traffic lights of the corresponding lane.
When turning indirectly left, the cyclist first stays to the right and crosses the junction or intersection. They then turn left. The cyclist therefore crosses two lanes straight ahead.
Of course, the question arises as to whether you want to cycle on the road or prefer to stay on the cycle path.
He could ask for clarification and discuss word definitions if the situation indicates a misunderstanding.
Thanks. I thought it was about counting. It all makes a lot more sense now. (And it also doesn’t.)
How?
Yes, if you push the circles down a bit, it forms a 7 by 7 matrix. But if pushing the circles into a square matrix is not allowed: how?
Edit: I get it now. It is about (efficient) packing not about counting. I also get the 4th panel now…
One aspect is how interesting you are as a target. What would a possible attacker gain by getting access to your services or hosts?
The danger to get hacked is there but you are not Microsoft, amazon or PayPal. Expect login attempts and port scans from actors who map out the internets. But I doubt someone would spend much effort to break into your hosts if you do not make it easy (like scripted automatic exploits and known passwords login attempts easy) .
DDOS protection isn’t something a tiny self hosted instance would need (at least in my experience).
Firewall your hosts, maybe use a reverse proxy and only expose the necessary services. Use secure passwords (different for each service), add fail2ban or the like if you’re paranoid. Maybe look into MFA. Use a DMZ (yes, VLANs could be involved here). Keep your software updated so that exploits don’t work. Have backups if something breaks or gets broken.
In my experience the biggest danger to my services is my laziness. It takes steady low level effort to keep the instances updated and running. (Yes there are automated update mechanisms - unattended upgrades i.e. -, but also downwards compatibility breaking changes in the software which will require manual interactions by me.)
I wanted to say the same. And furthermore I wanted to add that it’s beside the point of the comic. But I still wanted to say it.