- protect information, systems, and assets while delivering business value
- utilising risk assessments and mitigation strategies
- ability to recover from infrastructure or service failures
No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.
Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.
# | |
# mpv configuration file | |
# | |
# See the CONFIGURATION FILES section in the man page | |
# for a detailed description of the syntax. | |
# | |
# Profiles should be placed at the bottom of the configuration file to ensure | |
# that settings wanted as defaults are not restricted to specific profiles. | |
# | |
# Note that the commented example options usually do _not_ set the default |
[user] | |
name = Pavan Kumar Sunkara | |
email = [email protected] | |
username = pksunkara | |
[init] | |
defaultBranch = master | |
[core] | |
editor = nvim | |
whitespace = fix,-indent-with-non-tab,trailing-space,cr-at-eol | |
pager = delta |