

Yeah it’s worked everywhere I’ve tested. But that’s only really been airport WiFi, so I’m not sure it’s indicative of it working in general. It’s easy enough to setup for testing that it’s probably worth a shot
Yeah it’s worked everywhere I’ve tested. But that’s only really been airport WiFi, so I’m not sure it’s indicative of it working in general. It’s easy enough to setup for testing that it’s probably worth a shot
I like zerotier over wireguard because it’s one layer lower. So anything that uses Ethernet frames can be routed over it like it was a network switch plugged into your computer. This is probably why mdns works.
What’s saturated light and what is bingodabbing?
That’s kinda an insane amount of ram for most simulations. Is this like a machine learning thing? Is his python code just super unoptimized? Is it possible he’s making a bunch of big objects and then not freeing the references when he’s done with them so they’re never garbage collected?
It fulfills a different purpose than system packages. First, it can be run without privileges/system modification, so it works on immutable distributions. Second, it doesn’t share libraries between apps (with some exceptions) or the system, so you don’t have to package separately for each. It essentially takes some of the container philosophy/tech and brings it to desktop apps. This also gives it some ability to do some sandboxing that isn’t as easy with system installed apps.
This approach comes with some downsides. Particularly larger storage requirement for apps, sometimes less integration with the system, and lack of ability for apps to easily call/interact each other unless they’re packaged together.
It’s meant for complete GUI apps and not small tools/packages that are the standard in system package managers
In that case it’s highly unlikely your problem is with DNS. And much more likely it’s a problem with the actual connection to the server. If you are willing to share the IP/domain I can help troubleshoot (either here or in a DM).
If you do a DNS lookup (through nslookup
or many other tools) on the client you’re using to connect, does it get the right IP back?
Sorry I completely misread your comment to be saying that the maximum efficiency was 50% not that it occurred at 50%.
I believe for the highest efficiency you only want to use about half of the rated power of the PSU. So if your system draws 350W, 700 is a very reasonable power supply
Shouldn’t it be the median person?
This is a really good question!
I believe the general answer is, until the compressed file is indistinguishable from randomness. At that point there is no more redundant information left to compress. Like you said, the ‘information content’ of a message can be measured.
(Note that there are ways to get a file to look like randomness that don’t compress it)
By default, an enencrypted boot drive is not sufficient to be able to decrypt a LUKs drive. If you have to type in your password to start the computer/unlock LUKs then you should be good.
If you’ve setup a keyfile or TPM based decryption of LUKS, then your data is probably not safe (though a TPM based decryption could be if the OS is secure and secure boot is setup properly)
In this case, if you have another server then you could setup a mutual tang/clevis system where each device gets the keys it needs from the other server on the LAN. Both would be LUKs encrypted. So if one is online the other gets the required key from the online one while booting. But if both are offline then no keys are available and you have to type in a LUKS password to boot. Something like https://www.ogselfhosting.com/index.php/2023/12/25/tang-clevis-for-a-luks-encrypted-debian-server/ but what they do with multiple servers is probably overkill
That’s probably only for selling steam keys on another store. You might be able to sell non steam versions for any price you want
The original is something like “it’s all Ohio” “always has been”. The globe shown is just a large landmass that looks like Ohio. They’re probably astronauts since you’d have to be in space to see it. The astronaut killing the other has the Ohio flag on them and is killing them for knowing too much.
If there’s a 0 day in the VPN software then I’m also probably boned. The chances of that seem on par with the likelihood of an openssh vulnerability? I feel like vpns are useful to secure services without good authentication, but their use in front of an openssh server has never made much sense to me.
I think point two may be wrong. The strength of a shell should be proportional to its thickness, which would scale linearly with its size (assuming the shell got thicker in proportion to the size). There’s definitely a point where a self supporting egg requires very thick shells like you said, but the scaling law you gave uses the wrong change.
I have like 80gb of photos and videos on my phone, which is the vast majority of my storage space. I think the second category is signal’s database, also mostly consumed by sent media
Are there any two thoughts that are distinct from each other. Or is there only 1 unique thought (Choose any and then all others are a variation of it).
Also I disagree that thoughts and emotions are entirely distinct. Or does ‘thoughts’ refer just to language? Are visual thoughts thoughts? And if so, why not remembering the experience of pain?
Are memories thoughts? Or do I have to be commenting on the memory with language for it to be a thought? I feel like memories are 100% original too, since they’re a re-experience of something that happened to you, not based on anything that someone else has previously thought.
There’s so much to host that isn’t related to pirated media sharing though. I host like 5 services and only one could be related to that. I know you clarified that you’re talking about content, but there’s also so much content that isn’t related to pirating either. Like most of the fediverse for example