Accessing printers? Resolving hostnames of internal hosts? I can’t imagine having a lan without mDNS
Accessing printers? Resolving hostnames of internal hosts? I can’t imagine having a lan without mDNS
This would not be the default behavior of yt-dlp. Run yt-dlp -vF <video>
to view the sort order used. Acodec should come before abr.
It used to be the behavior of the original youtube-dl, however.
Resampling does not lead to any perceptible quality loss, but encoding to aac with libavcodec’s encoder (as YouTube does) definitely will. At the very least, it cuts all frequencies above 15 kHz which are potentially audible. Opus does not, and 128k opus is usually considered transparent.
I can’t find it but somewhere there’s a very detailed explanation from Monty himself about it
Are you using the very latest version? YouTube changed their site again a few days ago and it broke yt-dlps ability to find all thr formats. Update yt-dlp and it should be back to normal. yt-dlp will prefer the opus when it is available by default.
Opus is much better than (YouTube’s) m4a. m4a is better than mp3 (which is an obsolete 30 year old format). YouTube doesn’t serve mp3 (so creating one means re-encoding), and re-encoding lossy formats always loses quality.
yt-dlp is pretty much the standard program for it https://github.com/yt-dlp/yt-dlp
It is installable as a python module, so it should be easy to sandbox if you need to (though it requires ffmpeg too). Nowadays I almost view it as a standard unix utility though and wouldn’t think twice about installing the native package
Ok but I don’t see how that was ever in dispute?
Out of 4,037,953 GitHub user profiles with email addresses, we were able to identify 1,426,121 (35.3%) of them as men or women through their public Google+ profiles.
Could be a confounding variable in that the type of people who reveal their gender publicly might differ from those who don’t in some way that is also related to their contribution quality
It’s unfortunate that the other users are ignoring your actual question… You should still be able to bind qbittorrent to the wireguard interface, and you definitely MUST do so in order to make sure you’re safe (if the VPN drops, you don’t want it to fall back on your normal connection). If you aren’t sure what the wireguard interface is names, try running ip a
before and after activating the VPN connection and compare them.
Port forwarding allows other users to connect directly to your torrent client. Without it, it’s much more difficult for you to connect to other people who aren’t port forwarded (though not impossible if there’s a third, mutually connected client who can facilitate initiating the connection). Things will generally still work without it, but youll connect to fewer people, so it might be slower. And if you’re downloading rare torrents, you might have to be patient and wait for someone else to join and facilitate the connection
It’s useful for security researchers to collect and analyze what the newest attack bots are trying to do, in order to learn how to defend against it and study the malware they drop. There are some cool videos on YouTube about decompiling malware dropped by the bots.
Are they attempting to listen on the same port, so one of them is failing to? Try setting a different port number for the two
You’re thinking of partuuid
, regular uuids are part of the filesystem and made at mkfs time
That one hasn’t been around for a long time, since the Linux kernel started using a SCSI abstraction layer above many of the other storage protocols. Really cool stuff: https://upload.wikimedia.org/wikipedia/commons/thumb/f/fb/The_Linux_Storage_Stack_Diagram.svg/1161px-The_Linux_Storage_Stack_Diagram.svg.png
It was the point of software as a service and DRM
Maybe try Stash, it has gallery support too https://github.com/stashapp/stash
Also, what about jellyfin itself? It also supports photos
The issue is whether the data is collected by a known third party tracker domain which would be blocked by an adblocker
Lots of malware gets hosted using dynamic DNS domains, so they (or more likely some bot) probably saw the domain frequently showing up in malicious activity and blocked it without understanding that it itself isn’t the source of the malicious activity.
You can use cryptsetup-reencrypt to encrypt an existing disk in place with LUKS. Then you just have to modify the initramfs/bootloader/fstab to point to the new configuration. See https://wiki.archlinux.org/title/Dm-crypt/Device_encryption#Encrypt_an_existing_unencrypted_file_system
You could check out Misskey, another mastodon-like fediverse app with a large Japanese userbase and lots of artists
Wait till you hear about the idiots who unironically make that argument for banning Bitcoin too