

Let’s try this a different way…
How do you want to indicate something should be retained? What is the single, physical act you want to perform to tell the operating system “this thing needs to be captured”?


Let’s try this a different way…
How do you want to indicate something should be retained? What is the single, physical act you want to perform to tell the operating system “this thing needs to be captured”?


The screenshot folder itself is certainly not limited to just screenshots. Any file you can save can be kept in there. To my mind, the “entry point” is “saving a file to this particular folder”, regardless of the specific method used to do the saving. The screenshot is just an extremely convenient way to do that.
I just thought of a way to improve this technique with Tasker. Tasker can work with the clipboard, edit files, and take a screenshot. So, you could set up a gesture to trigger a task in Tasker. Tasker can then take the screenshot, dumping it into the folder. Tasker can then check the clipboard; if there is text in your clipboard, it can prepend it to a single “TODO.txt” in your screenshot folder.
Linux could be configured much the same way, using shutter and xclip to capture the screenshot and clipboard, respectively.


California’s new age verification law puts the onus on the operating system. When you install or setup your computer of device, you will be required to state your age, or the age of the child that will be using the machine. Sex offender App and Web developers are still required to demand the user’s age before providing their services, and children will still be required to announce their minor-ness to P(a)edophiles.
But, California will not require photos or ID scans, so it’s only the second worst of the three available options. The best option, of course, is to allow children to not tell potential pedophiles that they are kids.


What always got me personally is exactly that — over time I’d end up with multiple “entry points” depending on context (screenshot, chat, browser, notes…).
So long as you’re manually processing everything, screenshots work for all of that. You can take a note in any text box anywhere, and screenshot it. Chat message? Screenshot. Browser? Screenshot. Notes? Screenshot. You can even take a photo and then screenshot it to capture it into your workflow.
I have Shutter (apt install shutter) on my desktop, and I’ve changed the Print Screen key to shortcut to “shutter -s”. This lets me capture an area of my screen with one button (and a mouse drag). Bam, more screenshot.
The downsides of screenshot are obvious, of course: Extracting the text from the screenshot is a bit of a pain in the ass. If you really want to keep the same entry point, though, you could setup a script to OCR newly captured screenshot/photos to extract the text. An OCR-friendly font might make that pretty reliable.
Now I want to improve my setup…


Sex offenders (Domestically or abroad) who develop apps or web services will be compelled to collect age data from any minors who use their services. Kids who use these services will be compelled to give their age to these offenders.


On my phone, my Screenshot folder is syncthing’d to my desktop, so most of the time, capturing something in the moment is as simple as dragging three fingers down my screen. My Camera and default Download folders are also syncthing’d, so just taking a picture or saving something from a browser has it captured across my devices.
I also use Tududi, which has Telegram integration, for the quick note. Taking the note is just a matter of sending a message in Telegram, which is available on all my devices. Signal’s “Note To Self” feature is also useful; I trust it more than Telegram for sensitive data. In Firefox on my desktop, I have “Automatic Tab Opener” (Browser extension) pulling up my Tududi inbox every hour, reminding me to actually deal with the notes I have previously taken.


Syncthing functions as a sort of decentralized Dropbox or Google drive, by keeping folder content synchronized across any number of devices. I haven’t tried the iOS clients, but android, Linux, and windows work great.


I would strongly suggest Pangolin for that use case. It combines a reverse proxy with a VPN tunnel between your local network and your VPS. You can host your services on your local machine, and serve them from the VPS. Pangolin also sets up your letsencrypt certs for https.
It also provides a security layer: if enabled for a site, you have to be logged in to Pangolin before Pangolin will proxy traffic to your site.


Ah. A fellow KSP player.


Where will you be using this upload?
If you’re doing it to make it accessible on your own devices from anywhere, try Syncthing on the various devices instead. If the devices are on the same LAN from time to time, your modem won’t be a bottleneck.
If you still have the sources from which you originally acquired the books, you could use a VPS to re-acquire them, and then push them to the google drive directly from the VPS. They never pass through your modem; your modem can’t be the bottleneck.


It would be great if that argument prevailed, but it almost certainly won’t.


You’re having a conversation with a troll spanning across at least 10 different communities over three months?
The “context” is that “banning” is clearly one of your primary interests. You might consider starting a community on the subject.


This bill makes the operating system provider the responsible party. They have to implement this, and ensure compliance. Failure is a $2000 fine every time a child launches an application.
Under this law, Microsoft and Google are charged with implementing this feature and ensuring compliance. They are, obviously, “OS Providers”. They control their respective operating systems.
With FOSS OSes, Ubuntu isn’t the OS provider. Arch isn’t the OS provider. Debian, Redhat, Gentoo aren’t the OS Providers. The product each of these entities provide is an OS, but it is an OS that is under your full and total control. Not theirs. They cannot control what you do with the OS. They cannot ensure your implementation is compliant with state, local, national, or international law. Under this law they are not the responsible party.
Under this law. You are the “OS Provider”.


I just scrolled through about two dozen comments in your recent history. Every single one focused on banning and blocking content in the fediverse.
Do you ever actually participate in the discussion?


It depends on how you want to do it; how your reverse proxy server is setup. I use Pangolin running on a VPS as my proxy server. It uses a tunnel (“Newt”) between web servers running on my home network and the VPS, so I don’t need any open/forwarded ports on my home router.


I’ll need to know a little more about your setup. Sending DM…


An A record maps to an IP address. A CNAME record maps to another URL. Since you are trying to map to an IP address rather than a URL, you will want an A record.
If all of your sites will be served from the same proxy server at 204.230.30.104, you can create a single, wildcard A record for *.newexample.com. This will point every subdomain to your proxy’s IP address. You don’t need to create an A record for each subdomain.
If you are planning on serving some subdomains from 204.230.30.104 and other subdomains from another proxy at 69.4.20.187, you would need multiple A records for pointing the subdomains toward their respective proxies.
If you wanted to serve from proxy running on a dynamic IP address, and you’re using a DDNS provider to point newexample.ddns.net back to your current IP address, you could use a CNAME record to point newexample.com to newexample.ddns.net.


How long does it take to train, and how much would I earn while training, if I elected to quit after training, but prior to any operational assignment?


You evidently have displayport, so the solution seems pretty straightforward. Pull hard disks, install windows on a blank SSD. Send series of nastygrams to MSI.
My state is one that has recently adopted age verification requirements. Adult sites seem to be complying through IP geolocation, requiring users in my state to establish accounts. I think they are requiring a credit/debit card on file as evidence of age, but I cannot say that with any certainty.
VPN servers in less-oppressive jurisdictions bypass the account-creation requirement.