If they can smell and taste better than us, I’m sure water is closer to soda for them with many different flavors. My dog gets breta filled water, but prefers mountain spring water > rain puddle > breta filtered > tap.
If they can smell and taste better than us, I’m sure water is closer to soda for them with many different flavors. My dog gets breta filled water, but prefers mountain spring water > rain puddle > breta filtered > tap.
My dog is the pickiest eater I know. The problem I have is that it is never consistent. One day nothing is good enough, another he ignores steak for kibble, the next is a cat food day, then all of a sudden it is time for steak!
He has the forbidden knowledge that you can crave certain food at the moment, but he has no way to tell be what exactly he wants haha.
I am not sure about upcoming events, but if you have a phone I would highly recommend Stellarium. It helps identify everything and you can change your view based on time and location.
Let me introduce you to: https://reddthat.com/c/dog_doesnt_eat !dog_doesnt_eat@reddthat.com
If you think anything on the Internet can ever be forgotten… Your going to have a bad time. Passwords, one of the most protected data types, are compiled from beaches into huge databases so that hackers can use them to try to log into website. There are literally dozens of not hundreds of those password databases on the public Internet to be downloaded, not to mention private or dark web collections. If passwords are not safe, what makes you think publicly available social media would be any different?
Even if somehow the whole federation agreed to purge all post every year, things like the Internet archive and Google cache of pages would retain the data.
As an offensive security worker… I can’t help but read people listing out their attack surface 😂
It is always good practice to set up certificates everywhere. I do it for all of my internal services. Each person has a different level of care for how important privacy and security are and some people have abnormal threat profiles.
With that being said, options are usually to run self signed certificates, roll your own certificate authority for your network, or get valid certificates from a service like letsencrypt.
If he was food motivated to teach with, sure 😁
I usually set out options and give the command to eat. I’m getting better at guessing which food he wants though.