Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)DU
Posts
22
Comments
307
Joined
2 yr. ago

  • und wie viel vom deutschen streaming angebot besteht aus öffentlich-rechtlichen-vorabend krimis, RTL-Reality-Grütze oder schlechten Fernsehfilmen?

    Dark, Babylon Berlin, Tatortreiniger sind halt echte ausnahmen, und die US-Angebote haben oft n starkes Marketing, bekannte Schauspieler, sehen besser aus, sind tatsächlich gut oder alles zusammen.

    Mal davon ab, dass der deutsche Film im allgemeinen glaube ich nicht so beliebt ist bei uns, egal ob Streaming, Kino oder lineares Programm.

  • cassete beasts is a pokemon-like game, that wont require to much power.

    ember knights is very simmiliar to hades, both are great roguelikes.

    doom2, blood, duke nukem 3d etc run with low power consumption.

    a hat in time is a 3d jump n run that can ve limitted to 10 watt tdp (maybe less)

  • "Dracula braucht frisches Blut"

    original Titel:
    "The satanic Rites of Dracula"

    schau ihn, wenn du Christopher Lee und Peter Cushing magst oder auf B-Movie-Horror stehst. ist nicht der stärkste Film in der Reihe.

  • möglich, könnte auch intellij mit altem ui sein. war das beste erste Stockfoto das ich gefunden habe, auf dem ne integrierte Entwicklungsumgebung zu sehen ist und das laut ddg unter eine kreative-gemeine-lizenz fällt.

  • Einer unserer Admins, der jede wohl Privat auch turbulente Tage hatte.

    was genau das problem war weiß ich nicht, aber wie du siehst können wir wieder michmivhs konsumieren statt zu arbeiten :)

  • pillars of eternity, great game so far, did not play a realtime-with-pause rpg since kotor, but thanks to the auto-pause settings this plays really well. And while i can't claim to understand whats going on right now, the world seems to be really fleshed out and combats so far where very fun.

    brotato, fun take on the vampires survivor formular.

    backpack battles, an autobattler, but players don't draft from a shared pool, so you'll mostly draft the same builds everytime and don't care much about the builds you are dacing. not somerhing i'll continue playing, but it was ok to waste a bit of time, would probably be cool on mobile.

    doom2, but i am allways playing doom, so i guess that does not count.

  • It was written as part of my work.

    check your contract, you might not own the code and your organization may have a process to determine how to license something.

    to your other questions (IANAL)

    1. prior work wont be licensed, meaning no one but the owner of the work is allowed to do anything with versions prior to the license
    2. you don't have to, but i can't see a reason why you should not.
    3. GPL might mean that other work depending on gpl licensed code has to be licensed in a gpl compatible way, depending on how exactly you depend on it and how you distribute your dependencies. MIT/BSD is easier here, if you don't plan to license everything with the GPL anyway.
  • no, the solution is not to pay someone to have someone to blame if shit happens.

    there are a bus load of people involved on the way from a git repo to actuall stuff running on a machine and everyone in that chain is responsible to have an eye on what stuff they are building/packaging/installing/running and if something seems off, it's their responsibility to investigate and communicate with each other.

    attacks like this will not be solved by paying someone to read source code, because the code in the repo might not be what is going to run on a machine or might look absolutely fine in a vacuum or will be altered by some other part in the chain. and even if you have dedicated code readers, you cant be sure that they are not compromised or that their findings will reach the people running/packaging/depending on the software.

  • i can't see how paying someone would have changed anything in this scenario.

    this seems to be a long running campaign to get someone into a position where they could introduce malicious code. the only thing different would have been that the bad actor would have been paid by someone.

    this is not to say, that people working on foss should not be paid. if anything we need more people actively reviewing code and release artifacts even if they are not a contributor or maintainer of a piece of software.

  • And no, I have not tested it because I don't know how I'm actually supposed to do that.

    depends on what you backup and how.

    if it's just "dumb" files (videos, music pictures etc.), just retrieve them from your backups and check if you can open the files.

    complex stuff? probably try to rebuild the complex stuff from a backup and check if it works as expected and is in the state you expect it to be in. how to do that really depends on the complex stuff.

    i'd guess for most people it's enough to make sure to backup dumb files and configurations, so they can rebuild their stuff rather than being able to restore a complex system in exactly the same state it was in before bad things happened.

  • Metal @lemmy.world

    Skyclad - History Lessons

    DACH - jetzt auf feddit.org @feddit.de

    Umstrittene Terror-Ermittlungen: Der Messenger Signal als „Kult der Geheimhaltung“