YouTube hashtags don’t appear on top of title if alocation is set

Usually when adding hashtags to the video description, these tags will appear on top of the video title:



However, when adding a location in the advanced settings, the tags are removed from the usual location space above the video title:



I could not verify that this is documented behavior.
Is there any way to have both, location and hashtags above the title ?

Php Mysql one table username where password length is 60 what md5 or function don’t know

Php Mysql one table username where password length is 60 but i dont know what is function length is 60 . and i forgot my password. so my question is like i have created new user but which function length is 60 i dont know so let me know function name like md5 or other

Thank You, Your Faithfully, Mehul Kanjariya

enter image description here

Website page views for pages that don’t exist, is it spam or malicious activity?

I have recently bought my first domain name and set up Google Analytics on it, partially for learning and also out of curiosity.

I have noticed that I get multiple hits a day (even though my site isn’t registered on any search engines) but on pages that don’t exist and also with strange queries attached to them.

For example, some of the strange hits I have had page views for are:

/about?dm_device=mobile /contact?dm_device=mobile /categories/54920394 /store/shoes-38932522 

Even though I don’t have any paths for /contact /categories or /store, or many of the other pages that have been attempted to access, on my site.

I have looked at the hostname for these pageviews and those do not match the correct hostname for accessing the site, so my guess is that maybe some other site is using my GAID?

My biggest concern is that maybe these are malicious attacks of some kind?

The reason for me thinking this is that since I’ve noticed these pages being visited in GA, I have been receiving numerous spam phone calls on my mobile (5 or 6 a day), with recorded voicemail messages left not in English so I have no idea what it’s saying.

I have checked that my whois protection is working and on the surface it seems as though my information is protected, so it may just be coincidence about these spam calls.

If anyone can clarify what may be happening here and possibly put my mind at rest, I’d really appreciate it, and apologies if I haven’t asked this in the correct place!


Are there still any ATMs in Japan that don’t charge fees for withdrawing with a foreign card?

I just got back to Japan for the first time in five years.

I seem to recall that that some ATMs here don’t accept foreign cards, some do but charge a fee, and some do and charge no fee.

I’m 100% aware of the fees my bank at home charges me to use ATMs overseas, I’m not asking about that.

I believe it used to be that the Post Office ATMs and the ones at 7-Eleven didn’t charge fees. But when I used my first 7-Eleven one this trip it did charge a fee. Googling, I have found that Post Office ATMs now charge a fee but since results were still saying 7-Eleven doesn’t charge a fee I can see such pages are not up-to-date.

Does anybody know which, if any, ATMs in Japan still don’t have a fee?

Don’t show notifications for auto-archived emails in Mail app

I have a backup client on my computer that automatically sends me emails for each completed backup task each day. On Gmail I have a filter set up to make these emails skip my inbox (straight to archive) so they don’t pollute my inbox. This works great on the Gmail web client, but the iOS Mail app still shows notifications for these emails, even though they don’t get put in my inbox. If I check my inbox on the mail app, the emails don’t appear either.

How can I make iOS stop popping up notifications for automatically archived emails, but still get my normal notifications for everything else?

iperf/iperf3: Gigabit ISPs that do and don’t throttle single connections

Even though we have a gigabit service, my ISP is limiting the speed of single connections to 300 Mb/s. This is evident from my tests against various iperf servers in Europe, which all show that a gigabit of bandwidth is only available if making at least -P 4 .

ISPs want to limit the amount of terabytes per hour they carry per hour. So the best way for to keep things within their limits is for them to throttle our single connections, thus slowing down individual data packets so everything takes longer.

So for anyone – such as me – who uses a protocol that only makes one connection – and you’re having to traverse a network that does per connection throttling – you will encounter much slower speeds.

Has anyone else experienced such wide differentials? It would be interesting to compare our results, so please post them if you can.

If you’re in Ukraine or the United Kingdom by any chance, I’d be grateful if you could recommend an ISP that doesn’t engage in such practice.

Thanks for reading.

/usr/bin/landscape-sysinfo don’t show all mounted disks

When I log into my home server I’m created with the output of /usr/bin/landscape-sysinfo in the MOTD, however it’s missing one of my installed disks and I can’t work out why.

❯ /usr/bin/landscape-sysinfo                                                                    System load:  0.07               Processes:             133                                   Usage of /:   50.9% of 11.65GB   Users logged in:       1                                     Memory usage: 14%                IP address for enp2s0:                          Swap usage:   11%                                                                                                                                                                          => /mnt/disk1 is using 98.9% of 2.69TB                                                        => /mnt/disk0 is using 94.7% of 1.97TB                                                            => /mnt/disk2 is using 94.8% of 2.69TB                                                        => /mnt/disk3 is using 94.7% of 586.69GB 

Disk 4 is missing (df output trimmed for clarity)

❯ df -h                                                                                       Filesystem                  Size  Used Avail Use% Mounted on                                                             0:1:2:3:4                    16T  8.6T  6.0T  60% /mnt/data                                   /dev/sdc1                   2.7T  2.7T  1.6G 100% /mnt/disk1                                  /dev/sdd1                   2.0T  1.9T  3.9G 100% /mnt/disk0                                  /dev/sde1                   2.7T  2.6T  3.9G 100% /mnt/disk2                                  /dev/sdf1                   587G  556G  1.6G 100% /mnt/disk3                                    /dev/sdb1                   7.3T  979G  6.0T  14% /mnt/disk4      

Any ideas why this is and how I can fix it?

How to connect wireless dance pad (don’t have wireless adapter )

I am struggling to connect wireless dance pad to my laptop. I don’t have the wireless adapter for the dance pad as the seller forgot to ship it. I have a few wireless adapters for mouse/keyboard that I can use to connect this dance pad. Please advise what will I need to do? I am not a techie so please let me know in simple language what is that I will need? Thanks. Abhishek

Why people don’t use proxies for DoS attacks? [on hold]

I’m building a pretty simple website and recently I’ve been interested in doing a little research on DoS/DDoS attacks, because I use CloudFlare for the website and I wanted to see how it works, so I’ve used several tools to test if CloudFlare could stop the attack. Cloudflare successfully stopped the attack (100% they’ve just detected too many traffic coming from my IP and just limited it.. because I’ve used opensource tools). Also I’ve tried slow loris attack too which is a good way to bring a website down but they’ve stopped it too using the same way. This got me wondering: why people don’t use proxies for DDoS attacks? I mean there are thousands of public proxies that you can just use for anything, so why don’t people use them? Is it because of how proxies work?