• 2 Posts
  • 38 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle


  • Windows being easy to pirate wasnt the reason for it’s popularity. It had market share because they allowed for it to be preinstalled on machines for virtually nothing. They allowed it to be preinstalled on machines for virtually nothing because the OS wasn’t the flagship product.

    MS Office has always been the major flagship product for the company. This was true in 1994 and still is today. Office is so important to their revenue streams that it’s fairly common knowledge and has been mentioned by former employees that OS development would focus on compatibility with Office programs, not the other way around.

    Specifically if you look at the years around Office XP and 2003, that suite is used very much as a CVS. They deprecate their operating systems using Office.



  • Transmission is probably one of the best clients to use in a headless setup. I think it usually ranks lower because it doesn’t do a lot of things for you. What it does it does well, but nothing beyond that. Technically there is network binding, but by IP address and not interface. That means you have to script it which I know most people aren’t going to want to do. As far as searching, again you have to rely on other services that probably do it better anyway. Still I rank it alongside qbittorrent. It just takes a less user or beginner friendly route.



  • SFP is pretty straightforward. Most of the SFP modules you can buy you just connect and they work. For something like that, you would be doing fiber to ethernet hand off at a switch. Then you have pretty much everything run to the switch including router and just VLAN isolate. It’s not super complicated, but if you never messed with VLANs it might be better to go with something pre-packaged unless you’re up for learning.

    You could also do a DIY router and run a multi-gig SFP+ network card over PCIe. You still have to purchase a separate SFP module for that, but that is another option.




  • I set up a backup cell connection to my cable internet connection. Sketchy Chinese 4G LTE modem. My router was a DIY job I set up off of Ubuntu Server. Everything ran to a Cisco switch and then was VLAN isolated. For the two WAN connections, I ran scripts from the router that periodically tried to reach out to several DNS providers and then average response rates to determine if the main connection was up. If not then it would modify default routes and push everything to the cell.

    The cell connection had pretty low data cap, so it was just for backup and wasn’t a home style plan. I used the old TTL modification trick to get it to pass data like a phone. When I moved the backup to 5G, TTL modification stopped working and I had to resort to creating tunnel interfaces to an actual phone. Since that tunnel is limited in bandwidth to the lowest value, my speeds were really cut in half.






  • My take on this is that Shar knew about the prism, but simply just did not care. Sharran documents like to refer to the Dead Three as “godlings” which makes a lot of sense from the perspective of Shar. She’s old. Like really old. To her the Dead Three are not much more than mortals who tricked their way into a fractional amount of power, so their machinations are childlike at best and nowhere near on the scope of what Shar is capable of.

    I agree though that Shar wouldn’t thematically ever make any personal appearance or have any direct involvement with any of her plots. That isn’t her style. She would whisper commands to super high level followers, but even then never divulge the why of it. You would just get orders not explanations.


  • Morgikan@lemm.eetoSelfhosted@lemmy.worldAny feedback from port knockers ?
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    1 year ago

    A VPN would give you access to a network, but not necessarily the devices on that network. It adds another layer of security as the user not only has to have SSH credentials/keys, but they also have to have the same for the VPN. SSH and VPNs would really be used in conjunction with each other.

    It’s onion security.