• 1 Post
  • 33 Comments
Joined 1Y ago
cake
Cake day: Jun 14, 2023

help-circle
rss

Can you replace the CMOS battery with a supercapacitor that is kept charged? This should not need to be replaced every 4 years, I think.


Workstations machines get first name type names that are inspired by the brand of the machine. This asus is named adam.


Just never make it lie…


One place I worked we had a rule - do not name a server for any group using it. It seems the groups become territorial when you try to add a different group to “their” server.


T: "Tay" (a mythical creature from Scottish folklore, often described as a small, elf-like being)
U: "Ufi" (a legendary creature from Native American folklore, said to resemble a small humanoid figure)
V: "Vim" (a mythical creature from Hindu mythology, sometimes depicted as a bird-like being)
W: "Wyy" (inspired by the Wyvern, a legendary creature similar to a dragon but with only two legs)
X: "Xin" (a mythical creature from Chinese mythology, often depicted as a lion-like beast)
Y: "Yen" (a legendary creature from Vietnamese folklore, resembling a large, serpent-like creature)
Z: "Ziz" (a mythical creature from Jewish mythology, described as a giant bird)

Not so much servers as removable media. Three letter creature names: ape, bat, cat, dog, elk, fox, gnu, hen, imp, jay, kit, lee (fish), mus, nan (from Inuit folklore), owl, pug, qua, rat, sas (from Slavic folklore) and so on (I need to find my printed list beyond here)


Don’t remove the back door from your house, bar it with a sturdy 2x4 that holds it closed. Just be sure to use a 2x4 that is not made weak by the application of a specific chemical that only the secret bad guy knows about.


Well, at least it has a USB3 slot - you could put a NVME drive in a USB3 external case and boot that way.


I wonder if you can replace the storage element with something bigger. It might be a data drive or an M.2 drive. You could replace either with a bigger device.


Would the Pi automatically set an APIPA address if DHCP was not available? If so he need only connect the cable, and ask each machine what their address is.



Indeed - Meet Exciting New Alloy, playing on tour near you soon!


Some SSD drives can do a secure erase via block encryption where the key is stored on the drive itself. There is a command that simply generates a new key - Voilà your drive now contains random bits. I don’t know if newer spinning rust drives have this feature too.


I claim my new rock band name “exciting new alloy”


Does one have to supply the password at each boot with what you are describing - this sounds like the password is somewhere in the partition table. If so what do I google to learn more?


Since the disks are going to a ‘family member’ any porn at all, even the most tame, might get talked about.


Indeed - it seems that this tracking is done completely outside of the phone, asking the network where, physically, the push notification was delivered (Tower, time, and date) to locate the phone and ostensibly the owner of the phone.


If it is a hardware raid, would the boot sequence offer a raid setup choice before the OS boots?


Every time I have asked ChatGPT to code something it seems to lose the thread halfway through and starts giving nonsensical code. I asked it to do something simple in HP41C calculator code and it invented functions out of whole cloth.


I am not affiliated with them, but you can get a trigger file (Canary Token) from the people at Thinkst. I quickly looked around their site, and did not see how, but their adds say you can get them for free, without having to buy their canary hardware device.


That, and the fact that Spam abatement is a terrible chore. Whackamole at its worst.


Error 418

spoiler

I am not a teapot.


Can a computer monitor with an HDMI port stand in for a TV?



File sharing / storage via SSH, Minecraft server.



Good - my daily driver workstation is an i7 laptop running Kubuntu (auto correct wants me to run base Ubuntu ).


Cool - I probably won’t be using it on my Android phone. I keep it regularly copied to my workstation.


Thanks!

Will I be able to just launch Tailscale as a part of my normal startup? Can Tailscale start ‘invisibly’ that is without any interaction from me as I turn on and login?


Tailscale quick questions
I have a laptop and a desktop-based-server on a 192.168.1.x segment on my network. I want to setup Tailscale between them. Will it be bad if Tailscale connects while my laptop is local, on 192.168.1.x network? Can I make it automatically connect via Tailscale when away and via the local network when home? How can I best test the Tailscale network while I am at home?
fedilink

rsync:

#! /usr/bin/sh


TIMESTAMP_LOG="/path/to/logdir/.backuplog"
BACKUP_DEST="server:/path/to/backup/$1"
TIMESTAMP=$(date +"%Y-%m-%d %H:$M:%S")

echo "backup to:$BACKUP_DEST"
echo "Backup: $BACKUP_DEST $TIMESTAMP" >> $TIMESTAMP_LOG
pause
rsync -auvh /path/to/homedir* rhudson@$BACKUP_DEST

This should be called with a name of a target subdirectory in BACKUP_DEST… mine are rsynca, rsyncb, rsyncc but I will change this soon for day of week based directories.

I also have certificate authentication setup on ssh on my server - that’s why no password is needed.

Someday I will set up tailscale between this machine and the server.


Every time I have asked chatgpt to code for me it has come up with almost correct nonsense. When issues in the code are pointed out, chatgpt generates new code fixing the issue and creating two more new ones. Some of the issues are using features found in other languages in the language requested.

Programmers - your jobs are not in danger. It will take a programmer to check any generated code really carefully and be sure to understand what the AI has spewed forth.

For something as simple as hello world it would get it right. For creating a function to print numbers with imbedded “,” commas (to show powers of 10^3 separation) it got it wrong. It gave a program that returned “123,4567.89”


The ligitimate web spiders (for example the crawler used by Google to map the web for search) should pay attention to robots.txt. I think though that that is only valid for web-based services.


It is what your internet connected Tea kettle responds with when receiving a coffee information request.