Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)GR
Posts
0
Comments
161
Joined
12 mo. ago

  • But you dont what the code of the assembly-style centered div in your codebase. Because nobody will be able to read it and understand what it even does. There are abstraction specific ways to solve problems and the right way to do something in assembly is not the right way to do it in CSS.

  • Decryption is not related to root permission.

    If the ENCRYPTED drive is mounted to the container, then the container can decrypt it.

    If the DECRYPTED drive is mounted to the container, then the container never knows it was encrypted in the first place.

    Second case is easier BTW. Just mount the drive on your host, type in the encryption password and you get a new, unencrypted drive. Specify this new drive in your docker compose/docker file.

  • Generally, Linux Servers are best administered from a command line. At least in the beginning to set everything up. In turn they are faster on lower hardware as they dont even have a graphical desktop at all so need less resources. You could of course install a windows server OS. They can be fully administered through Remote Desktop and a GUI.

    There are multiple projects to make self hosting more accessible (like casaOS). They automate many steps of the setup and then offer you a webUI for further steps. Maybe have a look here https://github.com/awesome-selfhosted/awesome-selfhosted?tab=readme-ov-file#self-hosting-solutions

  • Absolutely!! Who came up with that idea. It should be a top level button not placed in ANY tab. And "latest"? That sounds like "featured apps that you might like if you are not looking for something specific". Why would I go there if I "am looking for something specific".

    Absolutely mindboggling design...

  • Except for that one time when they told everyone to go to that place and kill everyone there to claim the land in the name of the lord. And that second time, and third, and fourth...

    ... I wanted to make a joke about there having been 10+ crusades but the I realised the wikipedia list of crusades INCLUDES MORE THAN A HUNDRED MILITARY CAMPAINS DIRECTY LED, INITIATED OR SUPPORTED BY THE CATHOLIC CHURCH!

  • You can install packages from other places and create your own (and then install them). The distro maintainers have one (or multiple) list of "approved" software but you can add as many lists as you want to your package manager. Often software developers will have their own package list that contains only their own software and if you install it you have to add that list to your package managers trusted software locations. In that sense it isn't really better than going to the developers website and downloading an installer on windows but it is quite rare you have to do that

  • No there absolutely is a way without unconsented human experiments. You can go slow and prove every step of your procedure is save (enough) before doing it. That way you dont have to lie to the other people involved.

  • Addresses change all the time. Especially big websites will have many addresses for the same name and depending who (or from where) someone is asking for the name, they will tell them a different address. That way someone from Europe will connect to a server in europe and someone in the US to an american server. And cloud providers will have hundreds of addresses that they reuse and rotate for many customers.

    Also to reduce the number of name request, the DNS system will cache answeres (save the answer and use it again later). If I ask for the address of Lemmy.org, they then change their address and I ask my DNS server again, I will get the old outdated address again.

    There is also the question of who is actually in charge of answering DNS requests to a specific name.

    All in all there are a lot of moving parts and for some reason people seem to be bad at managing their DNS records so when something breaks, very often it is because of DNS. (But also because DNS is very fundament so any problem with DNS will have a big effect so it is more noticeable)

  • Permanently Deleted

    Jump
  • Everything should be encrypted, always. We live in a time where hardware for en/decrypting is so fast and cheap that they can be included in any device. If you send somethig through a it should be encrypted. If you send something over the air, it has even more reason to be encrypted. I see no scenario where it should not be.

    HOWEVER! For law enforcement and other official governmental agencies I think all communication should have to be recorded. And failure to do so should have very high penalties. Transparency should happen after, not during the communication.

  • Off topic, but how do you do that on Lemmy? In jerboa there is no option (that I know off) to browse another instance. Do you open your home instance in one browser tab and the one you want to explore in another and once you find a community you like you switch to the other tab and subscribe to it there?