[-] lungdart@lemmy.ca 24 points 5 days ago

Dumb TVs exist, and they're 5x the price of smart TVs.

Ads and data mining subsidizes the hardware cost. If you want cheap TVs you get spyware and ads.

[-] lungdart@lemmy.ca 41 points 1 month ago* (last edited 1 month ago)

Yes that's called routing.

You don't bind it to a NIC, you specify the destinations you want forwarded to each interface. Your VPN connection is just another interface.

If you're looking for good docs, you may want to Google split tunnel vpn, and also bone up on your networking.

A few static routes should get you what you need

[-] lungdart@lemmy.ca 44 points 2 months ago

The majority of the Internet's routing and switching architecture is BSD based. Historically it had the most stable and performant network stack of all the OSs.

I used it extensively at one job in a previous life when I was a network appliance developer. It was rock solid and lightning fast. Tried it as a desktop at home and had a terrible experience.

The little differences in the Unix commands used to drive me nuts as well...

[-] lungdart@lemmy.ca 55 points 3 months ago* (last edited 3 months ago)

https://darknetdiaries.com/transcript/140/

This pod cast is about someone who went through something similar, and ended up prosecuting.

See how negatively it affected their lives and decide if involving the police is best for you. I hope you agree that it is.

You may be preventing future crimes by stopping the behaviour early, even though it can be socially awkward to navigate this with a friend.

[-] lungdart@lemmy.ca 29 points 5 months ago

It's a buzz word.

Web 1.0 is just websites. They envisioned everyone had their own web site to blog on. Geocities, ISP hosting, web rings, link aggregators, and simple human curated search engines. That kind of thing.

Web 2.0 basically meant APIs. You could stitch a weather API with a map API and make a weather map app. This kind of came true, but it wasn't as free and open as people hoped for.

Web 3.0 is supposed the intersection of the web and distributed apps. Think games on the block chain like crypto kitties. It's mostly been a flop since blockchain based decentralization is slow, expensive, and difficult for users. That being said there are successful use cases like online wallet management and distributed exchanges (defi).

[-] lungdart@lemmy.ca 54 points 8 months ago

Doubt. You probably need to set the file owners in your volume to the same user running in the container.

[-] lungdart@lemmy.ca 54 points 1 year ago

Shaka, when the walls fell...

[-] lungdart@lemmy.ca 25 points 1 year ago

Sounds like you were out of resources. That is the goal of a DoS attack, but you'd need connection logs to detect if that was the case.

DDoS attacks are very tricky to defend. (Source: I work in DDoS defence). There's two sections to defense, detection and mitigation.

Detection is very easy, just look at packets. A very common DDoS attack uses UDP services to amplify your request to a bigger response, but then spoof your src ip to the target. So large amounts of traffic is likely an attack, out of band udp traffic is likely an attack. And large amount of inband traffic could be an attack.

Mitigation is trickier. You need something that can handle a massive amount of packet inspection and black holing. That's done serious hardware. A script kiddie can buy a 20Gbe/1mpps attack with their moms credit card very easily.

Your defence options are a little limited. If your cloud provider has WAF, use it. You may be able to get rules that block common botnets. Cloudflare is another decent option, they'll man in the middle your services, and run detection and mitigation on all traffic. They also have a decent WAF.

Best of luck!

[-] lungdart@lemmy.ca 20 points 1 year ago

Most people just use a browser these days, and they behave the same in every OS.

Steam has proton to run non native games on Linux, and works well enough for most things.

Try a few live images before making the switch.

[-] lungdart@lemmy.ca 20 points 1 year ago

Very common.

Don't feel pressured to approve anything you don't want to, but still be chill. It's just work after all. (This duality takes years to figure out, but if you can, you'll be very valuable)

Get the PM involved. Bring it up in retro and stand up.

Examples.

"I don't feel this is PR is up to our company standards. Here's a link to the document. Specifically tests are breaking, coverage is reduced, and your using global variables. If you need help with quality we can code pair next sprint or if I finish my tasks early. Let me know"

"Just a reminder that we have 3 PRs with needs work sitting in the queue. If you're not able to finish them before the end of the sprint, let the scrum master/PM know in case it's a high priority"

"We've all signed off on a standards guideline, and lots of PRs are falling short. Either we need more training time each sprint to reach it, or were going to have to officially reduce our standards. Let me know which one the CTO prefers"

[-] lungdart@lemmy.ca 31 points 1 year ago* (last edited 1 year ago)
  • Ff4, 6, and 7
  • Chronotrigger
  • Super Metroid
  • Castlevania SOTN
  • Zelda a Link to the past
  • Tony hawk's pro skater 1 and 2
  • Any of the street fighter
  • Pokemon
  • Star craft + brood war
  • Diablo 1 and 2

And so much more!

[-] lungdart@lemmy.ca 21 points 1 year ago

My parents died when I was young. Seeing other people's adult relationships with their parents is so foreign to me. My parents are frozen in time in my memories, and I can't imagine what their lives were really like or what kind of People they were.

9
submitted 1 year ago by lungdart@lemmy.ca to c/news@beehaw.org
view more: next ›

lungdart

joined 1 year ago