• 1 Post
  • 39 Comments
Joined 1 year ago
cake
Cake day: June 6th, 2023

help-circle


  • Nono, you are demanding in a not nice tone from a open source community to implement some bloat workaround to fix some you-specific-issue with commercial software. You know how free and open source software works? Either you contribute something positive, or you color yourself glad you get to use something so great completely for free and stay silent. Bark at that commercial vendor that doesn’t use the money from licenses + selling your soul to build something half decent! This upcoming demand-culture around things that others kindly share with wanting nothing in return pisses me off. Especially when it’s not even something about the project, but carrying over unrelated cruft, instead of directing the demand to the entitiy it would be justified against.

    Just build a browser extension that does the conversion. Or a script that watches a folder where you drag it into as an intermediary, and then it converts it automatically. And then share it for free, because you are a kind person! You might find a handful of people that like it. And then watch some asshat writing you a demand that “stop converting to jpeg, forever stop that! I need bitmaps for my gameboy! Just give me a SETTING where I can chooose and a nice dialog where I can pick the freaking color palette!”



  • Well you must have either set up a port redirect (ipv4) or opened the port for external traffic (ipv6) yourself. It is not reachable by default as home routers put a NAT between the internet and your devices, or in the case of ipv6 they block any requests. So (unless you have a very exotic and unsafe router) just uhhh don’t 😅 To serve websites it is enough to open 443 for https, and possibly 80 for http if you want to serve an automatic redirect to https.


  • That’s odd, I upgraded my ender 3 with bed leveling and removed the knobs to mount it fixed, because the damn knobs keep moving and then you have to redo the bed calibration. To be honest I can imagine one reason might be that a loosely mounted bed gives you more fault tolerance against the nozzle being too low. I put my bed on two parallel linear rollers for more rigidity, and combined with dual z screws the nozzle has no chance anymore to produce any sort of first layer when it is slightly too low. That made me realize just how much the stock ender 3 is flopping around, but also how this can give you mostly okayish results most of the time without having to deal with a ton of small tolerances.


  • A colleague of mine had a (non externally reachable) raspberry pi with default credentials being hijacked for a botnet by a infected windows computer in the home network. I guess you’ll always have people come over with their devices you do not know the security condition of. So I’ve started to consider the home network insecure too, and one of the things I want to set up is an internal ssh honeypot with notifications, so that I get informed about devices trying to hijack others. So for this purpose that tool seems a possibilty, hopefully it is possible to set up some monitoring and notification via uptime kuma.


  • skilltheamps@feddit.detoAndroid@lemmy.worldLooking for a Python Interpreter
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    edit-2
    8 months ago

    Well it is compiled to byte code in a first step, and this byte code then gets processed by the interpreter. Now Java does the exact same thing: gets compiled to byte code which then gets executed by the jvm (java virtual machine), which is essentially a interpreter that is just a little simpler than the python one (has fewer types for example). And yet, nobody talks about a java interpreter




  • And they believe all employees actually remember so many wildly different and long passwords, and change them regularly to wildly different ones? All this leads to is a single password that barely makes it over the minimum requirements, and a suffix for the stage (like 1 for boot, 2 for bitlocker etc), and then another suffix for the month they changed it. All of that then on sticky notes on the screen.


  • skilltheamps@feddit.detoSelfhosted@lemmy.worldSelf Hosting Fail
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    8 months ago

    Those are symptoms of sitting at that operation point permanently, and they are a of course a concern. What I’m after is that people think that energy gets put in to the battery, i.e. it gets charged, as long as a “charger” is connected to the device (hence terms like “overcharged”). But that is not true, because what is commonly referred to as “charger” is no charger. It is just a power supply and has literally zero say in if, how and when the battery gets charged. It only gets charged if the charge controller in the device decides to do that now, and if the protection circuit allows it. And that is designed to only happen if the battery is not full. When it is full, nothing more happens, no currents flow in+out of the battery anymore. There’s no damage due to being charged all the time, because no device keeps on pumping energy into the cell if it is full.

    There is however damage from sitting (!) at 100% charge with medium to high heat. That happens indipendently from a power supply being connected to the device or not. You can just as well damage your cells by charging them to 100% and storing them in a warm place while topping them of once in a while. This is why you want to have them at lower room temperature and at ~60%, no matter if a device/“charger” is connected or not.

    (Of course keeping a battery at 60% all the time defeats the purpose of the battery. So just try to keep it cool, charged to >20% and <80% most of the time, and you’re fine)


  • “overcharging” doesn’t exist. There are two circuits preventing the battery from being charged beyond 100%: the usual battery controller, and normally another protection circuit in the battery cell. Sitting at 100% and being warm all the time is enough for a significant hit on the cell’s longetivity though. An easy measure that is possible on many laptops (like thinkpads) is to set a threshold where to stop charging at. Ideal for longetivity is around 60%. Also ensure good cooling.

    Sorry for being pedantic, but as an electricial engineer it annoys me that there’s more wrong information about li-po/-ion batteries, chargers and even usb wall warts and usb power delivery than there’s correct information.


  • It is not that easy to understand what you want, to me it reads like you want something like Nextcloud - i.e. your own little cloud, where you can put all your stuff, and view it through the webbrowser or the nextcloud apps, and also keep selected parts of your stuff in sync with your devices (or automatically upload photos take with your smartphone for example).

    Backup of Nextcloud (or whatever you want to use) is a seperate topic. Any incremental backup tool would apply though, so there’s much to choose from. I personally use btrbk which uses Btrfs Send+Receive to push incremental snapshots to an offsite server.



  • It is not a fork aiming to replace it. It is rather a spin with saner defaults to cater to companies as customers. The product which shall carry ondsel financially is their freecad compatible cloud offering, and the hope is to use that for elevating freecad itself too. They need their spin to be able to ship an ootb experience fitting their motive and brand. So if you would like a less confusing experience it might be something for you. Currently there’s a lot of borderline deprecated and also redundant functionality in freecad, so I hope that ondsel’s cleanup mantra will make it to the ootp upstream experience as well.




  • In terms of helluvalot less critical - is it really though? Remember that the app on your phone is also witten by them, closed source and does whatever they want with your clear-text messages. If the trustworthyness of a messaging vendor is part of the critical-ness question, e2e encryption does not add anything: Either you trust them and could also do so when they process your message on their server, or your don’t and they could indeed spy on you on the proprietary client app.

    End 2 end encryption is only a real benefit when the ends actually belong to the user, i.e. theres transparency about the ends being clean, which can only be shown for open source ends. If the ends are potentially compromised, there’s so security / privacy guarantee.