Linux (systemd, NetworkManager): how to run a script on suspend before networking is shut down
How to reliably run a script that requires networking immediately before your computer suspends.
How to reliably run a script that requires networking immediately before your computer suspends.
The comic strip “Alice” has been added to my Comics Aggregator. This is a Comics Kingdom strip, so there are steps you need to take to be able to view it through the aggregator. Please remember to tip your waiter if you enjoy the aggregator.
You can use this script to maintain your Namecheap DNS records in a file which you can keep in source control!
Pull your Toodledo tasks and calendar entries into a text file every morning, where you can edit, add, delete, and reorder them, and when you’re done the changes go back into Toodledo.
Ever since I started being able to talk to my Android phone, I’ve wanted to be able to tell it to lock my screen. And ever since then, Google Assistant has stubbornly refused to do it. I can’t imagine why Google hasn’t implemented this feature; they obviously know people want it, since when you ask… Read More »
I ported TMDA from Python 2 to Python 3 so I could keep using it on my mail server. Turns out somebody already did that, but here’s my port anyway in case it’s useful to someone.
I want to give two examples, one medical and one technological, of the kind of buffoonery that the CDC is engaging in that continues to make them untrustworthy as a disease-control organization. Medical buffoonery Here are some things that COVID-19 research and recently collected epidemiological data are telling us at the moment: Here is what… Read More »
What should have been a simple transaction on my PS4 instead turns out to be an hour+-long debacle of things going wrong.
Companies that engage in slimy marketing practices tend to be slimy companies. RegScale fits that description, so you should avoid doing business with them.
Twitter is in the news again with another security breach in which 235 million users’ email addresses, phone numbers, and Twitter handles were exposed. These seems like a good opportunity to talk about what you can / should do to protect yourself if you need to maintain anonymity online. The basic rule is this: if… Read More »