What does TSA mean by “pivot point” when talking about shears/scissors in carry-on luggage?

I’d like to bring shears with me (as in the smaller hair shears like you can get at a pharmacy) in my carry-on luggage on a flight. This is what the TSA website says about scissors:

If packed in carry-on, they must be less than 4 inches from the pivot point.

What is the “pivot point” when referring to luggage? This is what I have – the main compartment opens pretty much all the way around. So where can I pack my shears so that it would be allowed?

Hiding desktop top panel through a shortkey. Is this possible? ( I am not talking about “auto-hide”.)

This is Ubuntu 18.10. Is there some sort of “command” that I can assign to hide top panel which shows time, date etc?

Note: I have tried this “Dash to panel” extension which I really loved it but the assigned shortkey didn’t respond:

Screenshot

When I press Super and “O”, nothing really happens. It Should reveal/hide the panel as it says? Or, am I assigning the shortkey the wrong way.

Fullscreening every app is not an option I want to use.

Supplemental GIDs not working with Windows 10 native client talking to non-MSFT NFS Servers

Similar to some others, we are having a supplemental GID problem with the Win 10 native NFS client. It runs only as NFSv3, so when I use a AD domain-joined Win 10 NFS client I cannot get the “AuxiliaryGIDs” field (in wireshark trace) to be filled in with ANY supplemental groups IDs. I read that MSFT claims RFC2307 does not specify a way to do this, and enumerating through all AD groups is not practical and now I am thinking this is not possible to a non MSFT NFS server from an NFSv3 Win 10 NFS client at all. The Win Svr AD Domain Controller I am using is set to regular AD. I nthe recetn CENTOS question it states to try and use “plain LDAP”. Would changing the Win Svr 2012 from AD-regular to AD-LDAP solve the issue by messing with the LDAP schema and/orconfig files like sssd? I have a feeling until MSFT Win 10 NFS client goes to NFSV4 I am not sure there is any other solution to missing supplemental groups going over the wire to an NFS Server other than using the SetGId Sticky bit.
Thank you for any insight!

~Charlie

Tenda MW6 mesh is talking to baidu – how do I evesdrop with a linux router?

I recently picked up a set of tenda MW6 mesh units – I’m running this in “bridged” mode, since that’s the only option that turns off their dhcp server. The primary mesh unit connected to a DIY linux router (ubuntu, with firewalld. The full setup is here) – which allows me to run a few more interesting tools to monitor my traffic. The linux router provides DHCP and DNS and has 3 ports bridged together to a single interface, and the primary mesh unit is on one of these ports. I can apparently run tcpdump and pick up traffic going through the mesh units

I’m running the mesh units in bridged mode, if that matters, and the backhaul to the secondaries are over wireless. The tendas are managed through a phone application but its local, with no cloud accounts set up.

                Router - Runs ubuntu + firewalld                 192.168.1.1                   +                   |                   |                   |                   v                   Primary Mesh Node (Tenda MW6) 192.168.1.99                    +  Secondary         |        Secondary 192.168.1.91 <-----+-----> 192.168.1.87 

I noticed using iftop that the devices talk to 45.113.192.102 – an IP that seems to belong to a chinese search engine called baidu, and tcpdump indicates that all 3 nodes are connecting to the IP over http

01:43:00.987943 IP 192.168.1.99.34783 > 45.113.192.102.http: Flags [F.], seq 1, ack 1, win 913, length 0 

is an example of the output of tcpdump at my main router. At this point – though I’m stuck. Is there any way I can check what the traffic is?