Some dingbat that occasionally builds neat stuff without breaking others. The person running this public-but-not-promoted instance because reasons.
Zuckerberg wrote that the censored content included humor and satire, and that administration officials “expressed a lot of frustration with our teams when we didn’t agree.”
It does, but given what it is they’re griping about being censored you can bet it was a lot of anti-vax/covid is a joke stuff. People trying to promote vaccination don’t tend to make jokes about it.
Anything specific to say they forced others not to run? The whole bit of others dropping out and endorsing happens regularly. Happened on the R side too. Bernie didn’t get nominated because not enough people showed up to vote at the end of the day. Having dedicated fans and lots of youth energy means nothing unless the vote count says what you want when it’s over.
I get the potential gripe, but realistically it’s hard to call it undemocratic even as it stands. People voted for an incumbent (essentially unopposed) ticket of Biden/Harris. Had Biden simply dropped dead this would have been the very same result. We just skipped the whole death part and moved on to the natural line of succession. Besides, how many times have we had a VP become pres or at least the candidate in the past few decades? Better than half since the 70s if I count correctly.
I’m not sure why there’s the need to rebrand confidence to the term dominance…
These are two quite distinct things. The former presents a self-assured certainty in your position, the latter is more aimed at a willingness to call out another on the wrongness of theirs. It’s a tough role to play when the positions of any given constituent and legislator are so entrenched, but necessary. It’s a bit like the comics of the type where you have one side saying ‘kill all X’ and the other saying ‘protect X lives’ and it’s somehow a compromise to only kill a few X…
I have to wonder, how hard would it actually be to set up one of these ‘luxury’ brand names with 1000% markups and use it to Robin Hood the crap out of a bunch of people with too much money. Pay for the local school renovation via profits off some of those people too high on their own farts to notice those around them.
https://emby.media/community/index.php?/topic/23648-tutorial-rar-playback-with-emby/
I’ve used this kind of setup, not the cleanest and doesn’t actually move/remove the rars but let’s a media player import the contents directly from inside them. Doesn’t make any notable impact on performance that I’ve seen.
They’re a part of the mix. Firewalls, Proxies, WAF (often built into a proxy), IPS, AV, and whatever intelligence systems one may like work together to do their tasks. Visibility of traffic is important as well as the management burden being low enough. I used to have to manually log into several boxes on a regular basis to update software, certs, and configs, now a majority of that is automated and I just get an email to schedule a restart if needed.
A reverse proxy can be a lot more than just host based routing though. Take something like a Bluecoat or F5 and look at the options on it. Now you might say it’s not a proxy then because it does X/Y/Z but at the heart of things creating that bridged intercept for the traffic is still the core functionality.
It depends on what your level of confidence and paranoia is. Things on the Internet get scanned constantly, I actually get routine reports from one of them that I noticed in the logs and hit them up via an associated website. Just take it as an expected that someone out there is going to try and see if admin/password gets into some login screen if it’s facing the web.
For the most part, so long as you keep things updated and use reputable and maintained software for your system the larger risk is going to come from someone clicking a link in the wrong email than from someone haxxoring in from the public internet.
I have a dozen services running on a myriad of ports. My reverse proxy setup allows me to map hostnames to those services and expose only 80/443 to the web, plus the fact that an entity needs to know a hostname now instead of just an exposed port. IPS signatures can help identify abstract hostname scans and the proxy can be configured to permit only designated sources. Reverse proxies also commonly get used to allow for SSL offloading to permit clear text observation of traffic between the proxy and the backing host. Plenty of other use cases for them out there too, don’t think of it as some one trick off/on access gateway tool
https://www.whois.com/whois/funkwhale.audio
Domain expired on the 19th, so it’s validly offline. Has always seemed to be a low-adoptiom platform, will have to see the status in the next few days.
It depends on the load on the disk. My main docker host pretty well has to be on the SSD to not complain about access times, but there are a dozen other services on the same VM. There’s some advisory out there that things with constant IO should avoid SSDs to not wear out the read/write too fast, but I haven’t seen anything specific on just how much is too much.
Personally I split the difference and run the system on SSD and host the bulk data on a separate NAS with a pile of spinning disks.
https://www.grepular.com/Transparent_Access_to_I2P_eepSites
Something like this makes logical sense, but can’t say I’ve ever tried such a feat. As a general rule though keeping the gateway/firewall free of extraneous software is a good practice just to limit the potential attack surface. If you try it I’d create a dedicated VM somewhere to host the i2p/Tor gateway from to keep it off the network edge directly.
Not sure if you mean to run the service on the FW or what ‘handle’ means here. If you have a second box though it would be easy enough to run all those services on a distinct server and then route their relevant ports through there with a policy based route on the firewall. That way you would only have to set up one for node for example and just have the client machines use that.
I guess it’d be a fuzzy space that falls right in why VCRs and cassette decks with record functions where allowed to exist. Time and format shifting are generally allowed, but retention or lending of it would be feasibly unauthorized distro. It’s that space carved out by the Sony/Betamax rule that says ‘if a tech has substantial non-infringing use then go for it’ in effect.
I guess it depends on what you’re looking for and what you consider flashy. I tend to do most of mine from GOG these days just out of a preference for avoiding DRM on principal. Found a few interesting ones just of the ‘cheap enough that it doesn’t matter if it’s not great’ types.
A major marker of quality for me tends to be if something just feels polished, like the menus make sense rather than looking like someone just stuck things where they could without though, but it could still run on a potato without making things melt.
Hardly the only, but not always the case either. I’d put some of it down to rose-colored nostalgia, some to the given fact that so much today is buying a base framework game and then selling 276 ‘addons’ to make it complete, and part to that back when systems didn’t have the power they do now developers couldn’t rely so much on all the flashy imagery and effects so they put more effort into the story and unique gameplay. A lot of smaller studio games pull that latter part off today still, but they’re sometimes harder to find.
One of the few places it could be posted on Lemmy without being down voted to the abyss, but only because it can’t be.