non_burglar

joined 2 years ago
[–] non_burglar@lemmy.world 2 points 16 hours ago

So... RSS is how sonarr and radarr work. What circumstance would make these not work?

[–] non_burglar@lemmy.world 4 points 19 hours ago

Voting only works if the results are anonymous. That is why Gerrymandering and FBI intervention into election activities is such a big deal.

[–] non_burglar@lemmy.world 5 points 20 hours ago (2 children)

I know what Fetcharr does and I still don't understand the need for it... Radarr and Sonarr both have profiles and upgrade policies for this that work fine.

What's the use case of Fetcharr?

[–] non_burglar@lemmy.world 12 points 1 day ago (2 children)

Radicale + client (Thunderbird on desktop, fossify calendar on phone)

[–] non_burglar@lemmy.world 1 points 1 day ago

Chip fabs need a lot of supporting tech, which is why it's difficult to set up and more difficult to move.

[–] non_burglar@lemmy.world 2 points 1 day ago

Use ps -ef to find the source of the file.

[–] non_burglar@lemmy.world 1 points 1 day ago* (last edited 23 hours ago)

find will catch more if you wildcard the name with "*windows*", but that's a moot point: we don't have enough info to jump to "malware" conclusions here.

Looking for malware by hunting for the name in a procid list won't usually get far, you'd be better to netstat to see what various processes are listening or phoning home to confirm suspicions of malware.

[–] non_burglar@lemmy.world 3 points 1 day ago* (last edited 1 day ago)

Yes, you can. Interac and INTUR are technically interoperable.

[–] non_burglar@lemmy.world 2 points 2 days ago

The oneplus 6t can supply 500mA through USB, it just can't negotiate usbC power delivery.

[–] non_burglar@lemmy.world 6 points 4 days ago (2 children)

Why don't you just copy the contents of that mega thread, post it here, and ask the mods to pin it? What's the obstacle, here?

[–] non_burglar@lemmy.world 3 points 5 days ago (3 children)

Security is nice to have but it's not the reason I'm using Linux, so handing over my photo ID to a third party I trust is an acceptable if disappointing risk.

And for us who don't find it an acceptable risk? Will I need an ID to read a book next?

[–] non_burglar@lemmy.world 20 points 5 days ago (2 children)

Deep packet inspection. Looking for patterns in the actual headers and payload of packets. Computationally expensive.

 

I've had two UAP AC AP Lite access points for 8 years now. After fooling with WiFi for so long before, Unifi was just a "set and forget" kind of solution.

Two days ago, the repo signature for the Debian unifi network controller became a pain point for apt, or apt started not being OK with it, or whatever.

Since I was on the fence about putting openwrt on these for a while, I took it as a sign and finally did it.

No more roaming problems, strong signal, responsive performance, wtf??... I'm not buying any more ubiquiti overpriced garbage. If it won't run an open platform like openwrt, it's not going into my infra.

That is all.

view more: next ›