YouTube’s a big place
- 0 Posts
- 288 Comments
computergeek125@lemmy.worldto IllegallySmolCats@lemmy.world•Remember to not kill Elon MuskEnglish11·18 days agoLook that’s a cute cat but this isn’t a politics community, I just want to see pictures of cats
computergeek125@lemmy.worldto Mildly Interesting@lemmy.world•The Lake Where Hundreds of People Died… TwiceEnglish3·19 days agoI do not recognize the bodies in the water
computergeek125@lemmy.worldto RPGMemes @ttrpg.network•When you're a completionist gamer.English1·21 days agoI have 4 characters (past and present) that all occupy the same “party role” for this reason. They each have their own back stories sure, but their decision-making process is essentially the same because it’s how I would solve that given problem. The same set of equations, just with different source data.
I hadn’t thought about over-exaggeeating a trait before to differentiate them, I may have to use that trick going forward.
computergeek125@lemmy.worldto Science Memes@mander.xyz•Neutronium would like a word.English1·27 days agoAnyone else notice that a large flat rate box has the same limit and the post only counts a small flat rate box?
computergeek125@lemmy.worldto Not The Onion@lemmy.world•FBI alert issued as time traveling hackers attack—act nowEnglish3·2 months agoTypically the same level of permissions needed to load drivers - which if they’re attacking the system using custom out of date drivers is relevant.
Having users and services at least privileges is one step of attack surface area reduction, but the “better” solution is to make sure that revocation check is enabled and that the compromised cert is revoked by its issuer. Or if it’s an old, unused root, you can ban that root at the machine level.
computergeek125@lemmy.worldto pics@lemmy.world•"The structure was 80m tall and soon fell out of favour with the local population. The company requested an architect to carry out embellishment work, which was when the four turrets were added."English3·2 months agoI suspect you may have meant to respond to the speed comment rather than root?
computergeek125@lemmy.worldto Science Memes@mander.xyz•How to satisfy your merry Curieosity....English6·2 months ago“The only difference between science and [messing] around is writing stuff down”
computergeek125@lemmy.worldto Programmer Humor@programming.dev•Synapse is the epitome of thisEnglish5·2 months agoFrom memory I can only answer one of those: The way I understand it (and I could be wrong), your programs theoretically should only need modifications if they have a concurrency related bug. The global interlock is designed to take a sledgehammer at “fixing” a concurrency data race. If you have a bug that the GIL fixed, you’ll need to solve that data race using a different control structure once free threading is enabled.
I know it’s kind of a vague answer, but every program that supports true concurrency will do it slightly differently. Your average script with just a few libraries may not benefit, unless a library itself uses threads. Some libraries that use native compiled components may already be able to utilize the full power of you computer even on standard Python builds because threads spawned directly in the native code are less beholden to the GIL (depending on how often they’d need to communicate with native python code)
computergeek125@lemmy.worldto 3DPrinting@lemmy.world•Designing a replacement IO plate for my GameCubeEnglish3·2 months agoTIL that exists, I thought you were talking about an actual flippy disk (lower case) until I got here.
computergeek125@lemmy.worldto Programmer Humor@programming.dev•isInHell = 'true'English2·2 months agoThe could be using .js and .py files directly as config files and letting the language interpreter so the heavy lifting. Just like ye olde config.php.
And yes this absolutely will allow code injection by a config admin.
computergeek125@lemmy.worldto Selfhosted@lemmy.world•Anubis - Weighs the soul of incoming HTTP requests using proof-of-work to stop AI crawlersEnglish121·2 months agoFound the FF14 fan lol
The release names are hilarious
computergeek125@lemmy.worldto Programmer Humor@programming.dev•Git, invented in 2005. Programmers on 2004:English5·2 months agoDoes that still happen if you use the merge unrelated histories option? (Been a minute since I last had to use that option in git)
computergeek125@lemmy.worldto Selfhosted@lemmy.world•Low resource, Performant WAFEnglish2·2 months agofail2ban isn’t a WAF?
Out of curiosity why would you call Ceph a fake HCI? As far as I’ve seen, it behaves akin to any of the other HCI systems I’ve used.
Not all of them. Ceph on Proxmox and (iirc) VMware vSAN run bare metal. That statement was a call-out post for Nutanix, which runs their storage inside a VM cluster. Both of these have been doing so for years.
computergeek125@lemmy.worldto Comic Strips@lemmy.world•[right to left] Windows 11 chan is not happy about User switching to LinuxEnglish1·3 months agoReddit is large enough that this would usually have ended up on one of the anime subs or technology joke subs rather than the general comics community.
computergeek125@lemmy.worldto Dungeons and Dragons - Memes and Comics@lemmy.world•Be menacing not moodyEnglish1·3 months agoRemember us… Remember that we once lived
Kupo? [Woop woop woooop]
I remember seeing these in the 2000s on road trips - real cell tower, fake tree for camouflage