Skip Navigation

Posts
0
Comments
115
Joined
2 yr. ago

  • SFP is pretty straightforward. Most of the SFP modules you can buy you just connect and they work. For something like that, you would be doing fiber to ethernet hand off at a switch. Then you have pretty much everything run to the switch including router and just VLAN isolate. It's not super complicated, but if you never messed with VLANs it might be better to go with something pre-packaged unless you're up for learning.

    You could also do a DIY router and run a multi-gig SFP+ network card over PCIe. You still have to purchase a separate SFP module for that, but that is another option.

  • I set up a backup cell connection to my cable internet connection. Sketchy Chinese 4G LTE modem. My router was a DIY job I set up off of Ubuntu Server. Everything ran to a Cisco switch and then was VLAN isolated. For the two WAN connections, I ran scripts from the router that periodically tried to reach out to several DNS providers and then average response rates to determine if the main connection was up. If not then it would modify default routes and push everything to the cell.

    The cell connection had pretty low data cap, so it was just for backup and wasn't a home style plan. I used the old TTL modification trick to get it to pass data like a phone. When I moved the backup to 5G, TTL modification stopped working and I had to resort to creating tunnel interfaces to an actual phone. Since that tunnel is limited in bandwidth to the lowest value, my speeds were really cut in half.

  • Gluttony might be an interesting idea. It's not necessarily necromantic, but the idea of using magic to force a person to eat until they cannot continue and literally rupture.

    Or, and this probably sounds stupid, but you could have a modified form of the grease spell that's just wet noodles. I don't know if you've ever stepped/slipped on wet noodles, but it's disgusting and traumatic.

  • A VPN would give you access to a network, but not necessarily the devices on that network. It adds another layer of security as the user not only has to have SSH credentials/keys, but they also have to have the same for the VPN. SSH and VPNs would really be used in conjunction with each other.

    It's onion security.

  • My understanding was it's bad practice to host images on Lemmy instances anyway as it contributes to storage bloat. Instead of coming up with a one-off script solution (albeit a good effort), wouldn't it make sense to offload the scanning to a third party like imgur or catbox who would already be doing that and just link images into Lemmy? If nothing else wouldn't that limit liability on the instance admins?

  • Suggesting a non-piracy option or providing links to non-piracy options is a violation of the community rules and guidelines.

  • Typically schools and universities have acceptable use policies for student VPNs. It is not very difficult to detect VPN setup on a network and universities almost always have at least some form of network monitoring happening.

    That said, VPNs are often times blocked and so is SFTP. Most universities I've done work with have a requirement that the traffic will be blocked unless you can make a case to IT as to why you need that access.

    There are few legitimate use cases for student VPNs and IT staff are usually not idiots and understand what you are up to.

  • Just throwing out a couple of other solutions I didn't see mentioned for DoH/DoT:

    1. CoreDNS
    2. Blocky

    Both of those support encryption and allow for DNSBL. If you are wanting to hand out DNS entries over DHCP it may a problem with your ISPs router there. Either replace it, sit one you do control between it and your network, or run DHCP snooping from a switch to restrict it's DHCP.

  • My suggestion is to avoid any cringey back story. Seems like all characters have some edgy drama they center on. Instead, have a really boring backstory like you're a retiree who is just looking to pass the time. Something you can kinda chuckle at to break the tension with having to roleplay.

    Or, if you have to have an elaborate backstory here is one I've used: your character's mind broke after whatever happened (like old age) and they believe they have made a pact granting them warlock powers. They don't have those powers and are just going batty, so just work it out with the dm where you "cast" hexblade but just do a normal attack. So you're just a fighter really but you'll be pretending you aren't with the other players.

  • I believe even linking or indexing can be problematic. I know Google receives DMCA notices to remove entries from search results. I think your solution is probably the better solution though compared to a lot of others.

    One point I would make though is that no one is hosting in this instance pirated material and therefore the other instances are not hosting pirated material. The pirate community is having very open pro-piracy discussions though. Discussion of illegal activity is not the same as illegal activity.

  • I don't understand the block either. That community doesn't share copyrighted material. From what I've seen, it doesn't link to copyrighted material. It does have very open pro piracy discussion and discussion about tools that would be used, but neither of those things are illegal.

  • You seen to be getting pretty upset about this topic for someone not arguing about it. If you don't have a position, that's fine. It doesn't seem that way, but that's you. Also that's again not how straw man is defined.

  • No, that wouldn't be a straw man argument. If you're going to try to call fallacy on something you would have to argue appeal to hypocrisy. However the hypocrisy is based on your post and previous posts calling for a boycott for something you find morally reprehensible while at the same time using a platform created by the morally reprehensible. One you have a problem with the other you do not. It calls into question your own morals when they only serve you when you think they should. That's all.

  • J.K. Rowling’s anti-trans rhetoric and activism has enough influence to lead directly or otherwise to the further persecution and discrimination against an already marginalised minority group.

    So does Lemmy and its developers pro-Uyghur slavery/genocide viewpoints. That doesn't stop you from using or enjoying Lemmy though. Everyone has their own red line. Lemmy hasn't crossed yours just like J. K. Rowling hasn't crossed theirs.

  • I'm not really familiar with Wii U emulation, but the cdecrypt github page says you can compile it on Linux. It isn't Windows only.

  • How is it theft? Who are they stealing from? It's a workflow tool, right? So then using Photoshop is also theft.

  • I've heard art student friends 20 years ago talk about how digital art isn't real art. I've also heard from them that in art history (although I can't confirm) that oil painters had a similar opinion of acrylic painters.

  • AI should be a tool artists choose to use to enhance their workflow

    From the comicbook.com article regarding what the artist did:

    The pieces of art aren't fully AI-generated but rather use AI tools to touch up or clean up pieces of the artwork.

    I think you are getting upset over an AI outrage piece.

  • 4K Porn?

    Jump
  • If you get a nice projector you can play it on the side of your neighbors house and they won't know.