@stardreamer@lemmy.blahaj.zone avatar

stardreamer

@stardreamer@lemmy.blahaj.zone

This profile is from a federated server and may be incomplete. Browse more on the original instance.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

No, the 2037 problem is fixing the Y2k38 problem in 2037.

Before that there’s no problem :)

What is something worth buying as a teen? please explain.

sense most online business are having black friday is it worth buying something or should i pass and try to save my money. im a teen i have around 200$ but i would like to limit myself to 100$ or less. im probably posting this in the wrong place but im not sure, i just want to make a smart choice when it comes to money....

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

As a counterargument: spend your money. 200 dollars means a lot more to a teenager than a college student (with an on-campus part time job), then when you find yourself at your first full time job you may sometimes be spending 200 dollars like pocket change.

As a result, you will most likely cherish what you buy now for 200 USD way more than what you can buy down the line. That console you need to save up 6 months for right now? It becomes a lot less sentimental when you can afford it every other month. So spend your money on something that you’d like right now. 200 dollars won’t change your life in college much, but it can change your life significantly right now.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

I’m not advocating that teenagers should save no money. I’m just saying you don’t have to save “all” of it.

Good financial planning isn’t just not spending every cent when you can, it’s also figuring out how to get the most out of your money. There is plenty of expensive stuff that I’ve spent thousands of hours with, which makes them totally worth the investment. There’s no way a teenager would be able to figure that out without some trial and error.

I’d say it’s better to get that out of the way now than later. If you make a bad purchase decision as a teenager, at most you’re short 200 dollars. Maybe that startup idea isn’t exactly what you imagined it to be, but at least you figured that out now than after sinking 20k into MLMs.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Thanks for the feedback! I’ll be sure to use non-printing characters instead of emojis for my passwords! (They can’t guess it if it’s invisible right?)

In all seriousness, why are people so adverse to using password managers? People are plenty willing to use the browsers built-in “remind my password” instead of a proper password solution such as bitwarden… And they come up with such “hacks” just to avoid using a proper length password.

stardreamer, (edited )
@stardreamer@lemmy.blahaj.zone avatar

Having one program (process) talk to another is dangerous. Think of a stranger trying to come over to me and deliver a message. There’s no way I can guarantee that he isn’t planning to stab me as soon as he sees me.

That’s why we have special mechanisms for programs talking to other programs. Instead of having the stranger deliver the message directly to me, our mutual friend Bob (IPC Library, binder in this case) acts as an intermediary. This way at least I can’t be “directly” stabbed.

What’s preventing the stranger from convincing Bob to stab me? Not much (except for Bob’s own ethics/programming)

To work around this, we have designed programming languages (rust) that don’t work if there’s a possibility of it being corrupted (I would add “at least superficially”, but that’s not the main topic here). Bob was trained by the CIA in anti-brainwashing techniques. It’s really hard to convince Bob to stab me. That’s why it’s such a big deal. We now have a way of delivering messages between two programs that is much safer than before.

The only problem is that the CIA anti-brainwashing techniques (rust) tend to make people slow. So we deliver messages less efficiently than before. Good news is in this case we managed to make Bob almost as fast as before, so we don’t lose our own much while gaining additional security. The people who checked on Bob even made sure to have Bob do the exact same thing as before when delivering messages (using RB Trees), hence this evidence is most likely credible.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Eat three elephants and one snake daily. If you’re still getting stomachaches, call me.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Can’t comment much about the docker side since it’s not something I’m familiar with.

For the kernel part, assuming what you’re referring to as UUIDs is the pid namespace mechanism, I’m failing to see how that would add overhead with containers. The namespace lookups/permission checks are performed regardless of whether the process is in a container or not. There is no fast path for non-containerized processes. The worst overhead that this could add is probably one extra ptr chase in the namespace linked list.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Worked in IT, target disk mode is a life saver when you have to recover data from a laptop with a broken screen/keyboard/bad ribbon cable and don’t want to take apart something held together by glue.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

I mean they’re not wrong…

This is why my next book will be titled “how to cook dinner without a compiler, GCC 4 to GCC 11 compatible!”

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

A more recent example:

“Nobody needs more than 4 cores for personal use!”

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Yep it’s Intel.

They said it up until their competitor started offering more than 4 cores as a standard.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

I see your decryption key extraction and offer you a 5 dollar wrench.

The wrench also comes with DMA (direct mechanical assault), RDMA (remote direct mechanical assault via throwing), and DDIO (deals damage if opposing) capabilities. It’s a real NSA bargain!

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Pretty sure the NSA doesn’t want the recovery key, they want the information the recovery key is protecting.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

My go-to is always PCManFM.

Yes the name sucks, but I’ve never seen another file manager with tabs, split view, customizable buttons, buttonizable nav bar, and have three different gui kits to choose from (Qt5, gtk2, gtk3). Really hard to beat all that.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

It’s based on a book by Sir Terry Pratchett (GNU Terry Pratchett, you shall be missed) and Neil Gaiman. If you know Pratchett then you know it’s mostly going to be an absurdist comedy.

Other works I recommend from Pratchett are Going Postal, Equal Rites, and Guards! Guards!

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

I’m in academia and I can report that still nobody uses those.

For your own archiving, just use Zotero.

For writing papers, use bibtex.

All those citing websites are just scams for high school/undergrad students trying to find their footing. There is no reason they should exist.

stardreamer, (edited )
@stardreamer@lemmy.blahaj.zone avatar

The problem is that hardware has come a long way and is now much harder to understand.

Back in the old days you had consoles with custom MIPS processors, usually augmented with special vector ops and that was it. No out-of-order memory access, no DMA management, no GPU offloading etc.

These days, you have all of that on x86 plus branch predictors, complex cache architecture with various on-chip interconnects, etc… It’s gotten so bad that most CS undergrad degrees only teach a simplified subset of actual computer architecture. How many people actually write optimized inline assembly these days? You need to be a crazy hacker to pull off what game devs in the 80-90s used to do. And crazy hackers aren’t in the game industry anymore, they get paid way better working on high performance simulation software/networking/embedded programming.

Are there still old fashioned hackers that make games? Yes, but you’ll want to look into the modding scene. People have been modifying the Java bytecode /MS cli for ages for compiled functions. A lot of which is extremely technically impressive (i.e. splicing a function in realtime). It’s just that none of these devs who can do this wants to do this for a living with AAA titles. Instead, they’re doing it as a hobby with modding instead.

Amazon issues warning about major change for Kindle users starting next month (goodereader.com)

In a recent communication, Amazon has alerted Kindle users about significant changes set to take effect from next month. The notification pertains to the phasing out of support for sending MOBI (.mobi, .azw, .prc) files through the “Send to Kindle” feature, starting November 1, 2023. This change, as News18 pointed out,...

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Epub is also a super easy format to script with, allowing easy parsing of webpages to ebooks.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Never “just” steam your veggies. Do a quick stirfry in oil with garlic then use the residual steam to finish it up!

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Not to be confused with Pepper Y, Pepper Z, and Pepper Pi

And do not make Pepper Pie.

NVIDIA R545 Linux Beta Driver Brings HDMI Deep Color, Night Color & FB Consoles (www.phoronix.com)

There are a lot of good improvements and fixes in this release. As a remorseful Nvidia on Linux user, I am extremely excited that GAMMA_LUT is finally making its debut in the Nvidia driver. This means I can actually try to use Gnome Wayland at night with the night shift feature, assuming other Wayland issues are also resolved.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Life sure is harder for vampires these days. Not only do you have to worry about garlic and stakes, but there’s also running tap water, concentrated solar energy, and Nvidia drivers going full brightness…

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

Make sure to test your setup if you are using DAV. Large files can fail if your nextcloud setup is done incorrectly.

Source: idiot who misconfigured PHP that resulted in a DAV client stuck in a retry loop, then getting banned by my own firewall for DoS.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

If it helps you avoid users it’s a plus.

I’d take deciphering the Rosetta code over that any day.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

One way to do this would be set up crowdsec bouncers on each server but only run a single instance of the crowdsec daemon. Send all logs to the daemon and let it communicate with all the bouncers.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • megavids
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • provamag3
  • tester
  • Leos
  • JUstTest
  • All magazines