My one and only reason is that I’m a turbo-nerd. No professional or even educational tech background at all.
My one and only reason is that I’m a turbo-nerd. No professional or even educational tech background at all.
I had a squatter get mylastname.com after my dad died. After a while I guess they noticed that I registered mylastname.net and orffered to sell me mylastname.com I didn’t respond and they let it expire. I should probably register it.
I’ve been daily driving the pre-alpha since January, it’s definitely got a bit of jank, but it’s in really good shape. The alpha should be pretty usable, and I think by the beta it should be pretty much good to go.
If we get some big breakthrough that sends storage costs and bandwidth cost way down then I think it’s possible. Otherwise between the astronomical costs involved and the difficulty attracting an audience and creators, I don’t think it would happen unless Google axes YouTube for whatever reason.
For network cables, FS.com. Their specialty is fiber optics and they have good transceivers and cables for really cheap prices and they also sell a tool to flash vendor info onto transceivers so if you have some picky proprietary box you can still use generic transceivers with it. Their copper products, DACs, regular cat6 patch cables, etc are good too. I haven’t tried their NICs or switches though.
The definitional boundary is where navigable airspace begins. You do own the non-navigable airspace above your property and you would have a trespassing argument if a drone entered that area without your permission. Where exactly the boundary is between navigable and non is a bit fuzzy but generally it will be at the highest object in the property eg. a treetop.
I still wouldn’t mess with the drone though, as another commenter said interfering with an aircraft of any type is a very serious crime.
Butchering generates filth but only final meal prep checks filth for food poisoning chance. So when you have extra space and resources it’s good to separate butchering from cooking to have the lowest chance of food poisoning. Also in an airlock design it keeps colonists from dragging bleeding dead animals through the kitchen.
I have a used 2016 super micro server. It was $600, has 2 18 core/36 thread cpus and 256 GB of DDR4 and 12 HDD hot swap trays. It also idles at 180 watts. Way over kill but I have cheap electricity and it’s nice being able to spin up a vm with just about any specs I could want. If I got some more normal cpus it would probably burn a good bit less power.
Is that a rimworld reference, because that’s prime rimworld base design
Cloudflare if you want one of the handful of TLDs they support, namecheap otherwise. For namecheap I still point the nameservers at Cloudflare so they can manage the site. For DDNS I use DDclient, it works, that’s about all I can or should say about a DDNS client.
Pi-hole is software that runs typically but not necessarily on a raspberry pi. It maintains a list of known advertising and tracking servers and blocks them by rerouting at the DNS level. For example an embed in a page tells your computer to contact tracking.facebook.com pihole tells your computer that that website is at 0.0.0.0 instead of it’s real IP address. Nifty thing is that you can redirect all of your DNS queries at the router so even devices that can’t normally run ad blockers can take advantage of it.
people sleeping or feeling worse around that time.
Well there’s a great big bastard of a nightlight out so I guess that makes sense.
Eh I figure everything you put online is on a marketplace somewhere. If it’s not the website that sold it, it’s the hackers that stole the data. Even when they claim they don’t store the data there always seems to be a plain text storing backup server that they forgot about. Then there’s data scrapers and 3rd party embedded trackers (looking at you share to Facebook button). And good luck convincing a court that thinks a PC is just a chrome portal that your owed damages for a company leaking your data.
Much easier to control the data at the source and keep websites from getting data in the first place. Trust is long dead online.
I just assume if there is a privacy policy, then the policy is no privacy.
A combination of Micro Center, FS.com, and eBay for computer parts. Anything worth researching I’ll try and buy direct from the manufacturer.
Dumb cheap stuff still goes to Amazon because if I need a $2 female USB-B to male USB-C adaptor or something like that I’m not willing to go through more than about 5 mins of searching and I know there’s some random blob of letters company on the Amazon marketplace that will give me something that functions. I definitely wait until I have something critical or reach $30+ before actually placing the order though.
2 right now, one on Lemmy.ml and one on my own instance. 3 if you want to count the server admin account. I’ve been thinking about adding more accounts on my server to segregate content so frontpage for each account could be somewhat focused while all would be a mess of everything.
Tbh I don’t really see much point to accounts on different instances. I might be missing something, but the only difference that I can see from a user’s perspective is what instances get federated/federated. You certainly don’t need an account to just browse instances for new communities to subscribe to on your instance.
Make some back ups. Its a good practice in general and when you are unfamiliar with Linux and especially the terminal it’s easy to accidentally kill the os. Always take a second to think about what you just typed if the command started with using sudo.
I appreciate all of the weird instance names in here
I prefer to use a local DNS for internal services just so there is less publically available information about my internal network. No need to let everyone know what address space I use or which vlan certain services are on. Also means you don’t have to wait for public DNS servers to update.
Yes, cracked Denuvo games actually run better because you aren’t running
a virusanti piracy software in the background. It runs at the kernel level and Crowdstrike is a pretty good case study on why that’s bad.