• 0 Posts
  • 97 Comments
Joined 1Y ago
cake
Cake day: Jun 24, 2023

help-circle
rss

I reserve .elf for executables for other platforms, like microcontroller firmware.


Doesn’t everything do this? If someone gets access to your hard drive, your fucked anyways. AI chat logs are about the least problematic thing on there.


Na let’s keep timezones, there useful for humans who generally want time to mean something, but lets ditch daylight savings time, all it does is make scheduling a massive pain twice a year, and messes up everyone’s sleep cycle. Without it, timezones would just be a fixed offset from another, minimizing trouble.


Looking at the logs if my Stable horde worker, more then half of requests made were to generate porn. They’d be shooting themselves in the foot regardless of if the filter worked as intended.


Don’t forget the loss of productivity in the hours before the meeting, spent worrying about it.


Randall did the math on this one: https://what-if.xkcd.com/31/

He assumes 64 GB microsd cards, if you use 1 TB ones, you could send 16 times more.


Easiest and most secure way? Mail (or hand deliver) a flash drive. That’s how they transfer data between super computers and data centers. (AWS even has dedicated trucks to do it)



If it’s local, try using over-the-air TV, if your close to a transmitter, you can get away with a fairly cheap antenna. (Or even just a paperclip.)


I don’t think the roof would be good at reflecting signals back at the device, it scatters them all throughout the building, rasing the noise floor. In a way, phone hotspots can cause less interference then a proper access point because they use a lower transmit power, and allow the other devices to reduce power.


I would think the metal parts of roof might be reflecting signals all around the building, which would cause interference between devices. (there is a limited number of WiFi channels), it might work better with a plastic roof, or one with RF absorbers.


GNU is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX[Maximum call stack size exceeded]


Security from what? Get a threat model.

A NAT will restrict connections from the internet, but won’t stop attacks from your local network. As your network grows, it might be a good idea to isolate shitty IOT devices (firmware is often full of holes), home internet and sensitive devices like cameras.


The simple fact that lemmy federates posts will mitigate the problems posed by this. For example if they want your IP, they need to go to lemmy.today, but for mine they will need to go to tchncs.de. If we were using reddit, they would be able to get everyone’s address with just one request. The more small instances there are, the harder it becomes.


Better cat version:🐈(){🐈|🐈&}


This would be real nice if this let you easly run commands as SYSTEM or TrustedInstaller from a script, not just as Admin. Not only can Admin be reached from the “Run as Admininstrator” menu option, is actualy quite limited for messing around with system files. For the most part, Admin lets you mess with system settings/registry, and user files, but not with a lot if system/application files without TAKEOWNing everything.


https://www.linuxmint.com/download.php /s, but you can use the offical version for playing games and stuff without paying, and there are easy ways to get around the limitations (remove watermark, change desktop background, etc).



OTA TV will probably work, depending on how close you are to a transmitter, you might even be able to get away with an unbent paperclip as an antenna.


Well that’s another one for the “list of companies that are never getting my money”.




You don’t even have to learn English, you just memorize a few flags/keywords, no complex grammar or anything.


Excel does this, so that German guy you forwarded a sheet to has to manually replace all the Polish function names before it works


And in the end you turned it back to an image.


You mean we are not supposed to trick after getting candy? That ruins the fun!


Still, things like content moderation and data analysis, this could totally be a problem.


Not yet, but their could be in the future. Best to ignore it and move on. Even if it is extremely unlikely to be prosecuted for this stuff, it has happened, so why risk it.


Ignore it. Anything you say will be used to build their case. I would just set up another server.


Less formal alternative: IMHO: You’re wrong.



They are programmed to do that to cover the companies ass. They are also set up to not trust anything you tell them. I once tried to get chatGPT to accept that Russia might have invaded Ukraine in 2022, and it refused to believe anything not in the training data. (Might be different now, they seem to be updating it, just find a new recent event)


Except worse, because it’s an electron app interpreting the app you actually want to run, so double slowness.



All that really does is guarantee that the professor will catch anyone cheating


General discussion of illegal activities is legal, but distributed methods/keys/software to bypass DRM is not. In addition to the poster getting in trouble, the admins of multiple instances could at minimum be forced to delete the content, and at worst get their asses kicked by Nentendo’s legal team, and be forced to reveal the identities of the user that posted it.


I just move any duplicate code into a function, no issues yet. (In face, fixing a single bug often ends up fixing multiple problems)


So many sites just outsource to content farms and have flooded the internet with SEO crap for years. With automation making this easier and cheaper it will probably only get worse.

Right now, generally well know sites like Wikipedia are fine, random people’s blogs are fine, but the first google result from some random company is almost guaranteed to be shit.


Check out OpenAssistant, a free to use and open source LLM based assistant. You can even run it locally so no one else can see what your doing.


Your going to have to read the input one piece at a time, allocating a bigger buffer as you go. (realloc is the way to go here) I recommend putting the input reading code in a function do you can easily use it multiple times.