Some ISPs block that site via DNS. If you switch your DNS server to something like 1.1.1.1 it may work.
Mordikan
- 0 Posts
- 152 Comments
So, the questions really are can your hardware support Windows 11 and if not can you easily flip to Linux.
-
The Asus Z170 motherboard looks like it supports TPM 2.0, but it doesn’t look like the i7-6700K does as that is a 6th gen Skylake CPU and Win11 starts at 8th gen. You might double check that with the TDM tool Microsoft offers though.
-
Cakewalk and Ableton appear to work in Linux, but not without some tweaking.
My suggestion would be to do nothing. If you can’t update without a rebuild and you can’t migrate without a lot work, just do nothing. Your Windows 10 installation will still work. You won’t receive any additional updates for it, but if that is the best solution for you at this time, then that’s what you should go with.
For the kiddo: Get a body wrap. It lets you because hold the baby to you securely while you do other things. I worked on-call shifts handling downed MPLS circuits for a carrier back in the day with my daughter strapped to me. A couple years later she would get to visit me at work. She was the only 2 year old who technically had PBX configuration experience (I didn’t know the keyboard was still connected).
-
Mordikan@kbin.earthto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Buying Private tracker invites7·7 天前I don’t trust them, but based on some assumptions. They are statically less likely to be taken down. That cannot be argued, but because of strictly enforced rules, most (at least the ones I’ve seen) do not allow VPN IP addresses to be registered. The issue there is the user has a forced increase in reliance on the site operator to maintain pseudo-anonymity.
The fact you were able to buy in without any proof of who you are or that I’ve encountered people just giving away invites to strangers, would suggest at least some of these trackers are not trustworthy. What protects those communities is their insular nature. Once that’s circumvented, its essentially just the same as a public tracker.
It seems like a well supported shell on windows
But you aren’t using Windows. You’re also now adding a .NET Core requirement for any Linux box wanting to use it. That means limited functionality as its not the full blown .NET framework. So, compared to something like bash, you now have added requirements with less functionality.
To answer your original question though, a lot of people prefer zsh as its got a crazy amount of customization you can do. People also like fish due to it being very friendly and interactive.
Mordikan@kbin.earthto Selfhosted@lemmy.world•How to Setup a Secure Ubuntu Home Server: A Complete Guide5·8 天前But you need that legal banner in case your spouse acts up and you need to throw their ass in prison.
I’ve used i3wm for a long time now before switching to hyprland. The top useful thing: Workspaces. Even without tiling, workspaces give a massive productivity boost. You can have email clients open on one, monitoring systems on another, browsing on a third, gaming on a fourth. When you combine with tiling, everything is in its own perfect space and nothing overlaps. This is especially useful on single-monitor or laptop setups as you don’t need multiple monitors to keep track of everything.
I also see people struggle with notifications tiling. You probably don’t want a bluetooth connected message to take up half your screen, so you’ll want to make sure to properly configure those things. At least in i3wm/hyprland, you can use the window class name to exclude a window from tiling (ex.
for_window [class="mako"] floating enable
orwindowrulev2 = float,class:^(mako)$
).
At most I have about 3 windows open at a time per workspace with 4 workspaces being used at a time for specific tasks. With the combo of tiling and workspaces I have never run into an instance of “clutter” on my desktop. This is off a single monitor setup too that I also use on my laptop.
Mordikan@kbin.earthto Linux@lemmy.ml•GNOME AI Virtual Assistant "Newelle" Reaches Version 1.0 Milestone2·9 天前I’ve had good experience with smollm2:135m. The test case I used was determining why an HTTP request from one system was not received by another system. In total, there are 10 DB tables it must examine not only for logging but for configuration to understand if/how the request should be processed or blocked. Some of those were mapping tables designed such that table B must be used to join table A to table C, table D must be used to join table C to table E. Therefore I have a path to traverse a complete configuration set (table A <-> table E).
I had to describe each field being pulled (~150 fields total), but it was able to determine the correct reason for the request failure. The only issue I’ve had was a separate incident using a different LLM when I tried to use AI to generate golang template code for a database library I was wanting to use. It didn’t use it and recommended a different library. When instructed that it must use this specific library, it refused (politely). That caught me off-guard. I shouldn’t have to create a scenario where the AI goes to jail if it fails to use something. I should just have to provide the instruction and, if that instruction is reasonable, await output.
Mordikan@kbin.earthto Linux@lemmy.ml•GNOME AI Virtual Assistant "Newelle" Reaches Version 1.0 Milestone2·9 天前You could use AI for self-healing network infrastructure, but in the context of what this tool would do, I’m struggling. You could monitor logs or IDS/IPS, but you’d really just be replacing a solution that already exists (SNMP). And yeah, SNMP isn’t going to be pattern matching, but your IDS would already be doing that. You don’t need your traffic pattern matching system pattern matched by AI.
Mordikan@kbin.earthto Linux@lemmy.ml•GNOME AI Virtual Assistant "Newelle" Reaches Version 1.0 Milestone81·9 天前Would you really trust your system to something that can do this? I wouldn’t…
I wouldn’t trust a Sales team member with database permissions, either. This is why we have access control in sysadmin. That AI had permission to operate as the user in Replit’s cloud environment. Not a separate restricted user, but as that user and without sandboxing. That should never happen. So, if I were managing that environment I would have to ask the question: is it the AI’s fault for breaking it or is it my fault for allowing the AI to break it?
AI is known for pulling all kinds of shit and lie about it.
So are interns. I don’t think you can hate the tool for it being misused, but you certainly can hate the user for allowing it.
Asking for evidence wasn’t the issue, believing that the truth relies solely upon a discussion providing such evidence is.
Again, post your evidence or didn’t happen. Literally everything after that meaningless without that. The discussion is over because you can’t provide that as you are wrong. End.
Unrelated, but absence of evidence is not evidence of absence.
So, I’m not allowed to ask you for proof of your statement? And if its unrelated, then why did you post it? Its unrelated. Also, you’re saying you have an absence of evidence, ergo you have no evidence. Having no evidence does not qualify as evidence.
Removing an identifier that is used. (1/100 = matters, “isn’t really used” != unused). This contradicts your other statements:
Just because an identifier exists doesn’t mean it is used.
BidRequest.imp[i].tagid
exists, but advertisers don’t use it. I think you are confusing having an option with something being mandatory.And Tor nodes are not the same thing as VPN multi-hop. If you think that they are, wow! VPN multi-hop is you connecting to a provider’s server that connects to another one of the provider’s server then out. It’s all the provider’s network.
And again, if you connected your Firefox browser to Tor, we could still track you. You’d get cookied or localStorage() tracked. When you disconnect from Tor, that stuff is still present in your browser. Almost like the number of hops you take or the IP address used doesn’t seem to really matter, huh?
EDIT: I just realized you think that Tor is built using multi-hop VPN. Its a real life Dunning-Kruger effect! I’ve never encountered this. You are going to do something really stupid and end up in prison.
Mordikan@kbin.earthto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•U.S. Senators Introduce New Pirate Site Blocking Bill: Block BEARD * TorrentFreak63·11 天前I bet they spent more time working on making a cool sounding acronym than they did actually writing the bill. If this actually passed, it would do nothing except encourage people to use an out of geo VPN, I2P, or non-US DNS server.
Yeah, GPG keys expire, but that happens with all package management systems if left alone long enough. I mean you’d have to maintain like 3 packages (linux, wireguard-tools, archlinux-keyring). In Debian you’d have to maintain the kernel, debian-archive-keyring, and wireguard-tools. Its the same.
If its solely for setting up a wireguard server, it doesn’t need to be rolling release. Nothing should really need changing.
- Alpine Linux due to it being lightweight and hardened
- Arch Linux due to it being lightweight and fast
- Rocky 9 due to HAProxy in case you decide to turn this into a DIY datacenter :)
I really like btop/bpytop too. Its more useful than glances imo.
lazydocker:
terminal based docker managementncdu
: disk usage analyzernmtui
: terminal based network managementbrowsh
: terminal based web browser with headless Firefox backend
One other thing I didn’t mention is it depends on the backup tool you use. Not all of them are filesystem aware. What that means is if you have hardlinks present those will not be preserved.
That can be important to remember as it will bork things down the road with the restoring. If you aren’t familiar with linking: Hard links point to actual data (think of it like a pointer in C). Soft links (symbolic) point to file path.
Mordikan@kbin.earthto Linux@lemmy.ml•Pop! os-really trying, but constant crash has me frustrated.4·13 天前Have any other distros been tried on this box and do the same issues present with them? I think the recommended PSU combined with an RX580 is 600W, so you might try swapping PSUs. Another option if you don’t have a spare to test with is to undervolt the GPU. If it stabilizes at that point, it would suggest the PSU needs replacement. At least that way you wouldn’t be dropping money on a hunch.
Another good indicator of that being GPU/PSU issues is the fact you mention not being able to get past the login screen. Both X11 and Wayland (especially Wayland) crank up the VRAM usage at that point due to compositors caching and whatnot
I would only expose a port to the Internet if users other than myself would be needing access to it. Otherwise, I just keep everything inside a tailscale network so I can access remotely. Usually I believe people put a reverse proxy in front of the Jellyfin server and configure your certificates from there. So Jellyfin to proxy is insecure and then proxy to internet is secure. Lets Encrypt is an easy way to do that. And if you are going to expose a port you definitely want fail2ban monitoring that port.
If using tailscale funnels, you can technically skip the certificate part as that’s done for you, but that would take away from the learning experience of setting up a proxy.