Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SH
Posts
0
Comments
17
Joined
8 mo. ago

Permanently Deleted

Jump
  • This is some ignorant FUD. Everything you just listed is technology companies, who get blamed for every computer failure whether its their fault or not, trying to prevent those problems. TrustedComputing and TPM is a direct answer to malware. UEFI a direct answer to ever increasingly complicated computer hardware, kernel-level DRM is a direct answer to software piracy and online game cheaters.

    These things are implemented because there's a lot of people making a lot of money ruining the lives of people who just want to use their computer. Just because YOU can't explain it, doesn't mean it's evil.

  • Musicbrainz Picard --> mp3Tag --> MusicBee

    • Picard handles the initial tagging.
    • mp3Tag handles the clean-up. I like things "just so", and some of the time Picard goes rogue. The Actions function is super powerful for automating "fixing" tags. Oh, and you can cut, filter and paste an entire directory's worth of song tags if you want to bulk remove a bunch of unwanted tags that Picard adds.
    • MusicBee is the database. I like the Inbox feature that allows me to do a last check before "promoting" the files to my master library.

    There are portable versions of all three, so you can lock a version in your music directory and never worry about updates ruining your tags.

  • I’ve been using them for a couple years now and, so far, only one vendor has rejected their card. I pay for their service, so I don’t have any limits and their cash back program usually pays for the monthly fee.

    I rarely use my actual CC anymore, and now they integrate with Apple Wallet, I will probably stop needing my bank card altogether.

    I love being able to visualize all my subscriptions in one place and be able to turn them off whenever I want. That alone is worth the price.

  • The second phase is to stop using all the accounts they find and start using disposable emails and credit cards. I use Simple Login and Privacy and have made it very difficult linking my information in any low-level clearinghouse.

  • Know your worth. Keep it real, but know exactly what you bring to the table as an employee and how much that’s worth. If you don’t know, figure it out.

    When interviewing, pay attention to any point of conversation that implies that the role is less than your worth and ask questions. You may dodge a huge bullet.

  • You either have to use the two very specific coolers that Asrock recommends or you have to mildly modify the motherboard. Once you do, you will realize the mounting bracket is for an Intel board.

    I did the mod and run a Noctua tower with the LGA bracket adapter.

  • The answer is an SSH reverse tunnel. Have privoxy running in the rPi listening on localhost. Have it then connect to your home server via SSH with reverse tunnels enabled, tunneling the privoxy port. On your home server you run another instance of Privoxy that’s listening in your home network and proxy forwarding over the tunnel and you’re done.

    I used to use this setup for pen testing.