I’m a technical kinda guy, doing technical kinda stuff.

  • 0 Posts
  • 46 Comments
Joined 1 year ago
cake
Cake day: September 27th, 2023

help-circle

  • Blu-Ray USB drive and M-Discs is about the best you can get at present. Keep the drive unplugged when not in use, it’ll probably last 10-20 years in storage.

    Seeing as there hasn’t been much advance past Blu-ray, keep an eye out for something useful to replace it in the future, or at least get another drive when you notice them becoming scarce.


  • I don’t think there’s anything commercially available that can do it.

    However, as an experiment, you could:

    • Get a group of photos from a burst shot
    • Encode them as individual frames using a modern video codec using, eg VLC.
    • See what kind of file size you get with the resulting video output.
    • See what artifacts are introduced when you play with encoder settings.

    You could probably/eventually script this kind of operation if you have software that can automatically identify and group images.





  • Letting it ring has no impact. They have autodiallers that call, and when someone picks up, only then is that call assigned to someone in the call centre.

    You can often tell this because there is a marked delay in the response to your initial “Hello?”. Long enough that you can reliably just hang up if you don’t hear a response in two seconds.

    If it’s a real person who actually wants to call you and they you call again straight away, you can just shrug off your hang-up as a network issue.


  • Dave.@aussie.zonetoLinux@lemmy.mlCompanies that use desktop Linux
    link
    fedilink
    arrow-up
    39
    arrow-down
    1
    ·
    22 days ago

    how the IT team tries to justify being locked into Microsoft, and then telling me I could potentially become a point of vulnerability

    Because they can manage and control all the windows PCs , pushing updates automatically, restricting what users can do locally and on the network, they have monitoring tools and whatever antivirus and antimalware tools they have, and are able to easily manage and deploy/remove software and associated group licensing and so on and so forth.

    Meanwhile you’re a single user of unknown (to them) capabilities that they now have to trust with the rest of their system, basically.

    The first rule of corporate IT is, “control what’s on your network”. Your PC is their concern still, but they have no effective control over it. That’s why they’re being a bit of a pain in the ass about it.


  • True. Hence my caveat of “most cards”. If it’s got LEDs on the port, it’s quite likely to signal which speed it is at with those LEDs.

    I haven’t yet come across a gigabit card that won’t do 10Mbit (edit: switches are a different matter) but sometimes I’ve come across cards that fail to negotiate speeds correctly, eg trying for gigabit when they only actually have a 4 wire connection that can support 100Mbit. Forcing the card to the “correct” speed makes them work.


  • I’m guessing something like:

    Robots.txt: Do not index this particular area.

    Main page: invisible link to particular area at top of page, with alt text of “don’t follow this, it’s just a bot trap” for screen readers and such.

    Result: any access to said particular area equals insta-ban for that IP. Maybe just for 24 hours so nosy humans can get back to enjoying your site.






  • Dave.@aussie.zonetoSelfhosted@lemmy.worldMy homelab had the stupidest outage ever
    link
    fedilink
    English
    arrow-up
    158
    arrow-down
    1
    ·
    edit-2
    1 month ago
    1. Replace CMOS battery.
    2. Get small UPS.
    3. Discover that small UPS’s fail regularly, usually with cooked batteries.
    4. Add maintenance routine for UPS battery.
    5. Begin to wonder if this is really worth it when the rest of the house has no power during an outage.
    6. Get small generator.
    7. Discover that small generators also need maintenance and exercise.
    8. Decide to get a whole house battery backup a-la Tesla Powerwall topped off by solar and a dedicated generator.
    9. Spend 15 years paying this off while wondering if the payback was really worth it, because you can count on one hand the number of extended power outages in that time.
    10. In the end times a roving band of thugs comes around and kills you and strips your house of valuable technology, leaving your homelab setup behind and - sadly - without power. Your dream of unlimited availability has all been for nought.

    Conclusion: just replace the CMOS battery on a yearly basis during planned system downtime.




  • Have a look here at the ICMP source code in the Linux kernel at line 400. That is the ICMP reply code.

    At lines 433/434 you can see the collection of the source and destination MAC addresses from the incoming packet. The source is just lifted directly from the packet, the destination is done with a helper function that presumably looks at which interface it arrived on and returns the MAC address of that interface.

    Lines 441 onwards construct the reply packet and push it to the generic ICMP transmit function (which is a bit higher up in the source code), which then pushes it on to the network stack.

    Hope that gives you an idea of how it works internally! It’s really only a slightly more detailed version of the actual standard, there are a few checks to make sure that we are not exceeding network rate limits in the stack and etc, but it’s a quite simple bit of code.

    Added edit: it’s “simple” at this point because a lot of the work has already been done. The packet has arrived via the network stack, it has been determined to be an ICMP packet, and it was sent here to this function. There are already functions that send packets out via the network stack, so this chunk of code just builds an appropriate packet and hands it on to be sent.