

Bruh Brave nuked it

___


Bruh Brave nuked it

___


Thanks for sharing! I’m running a Tor bridge on a Pi 5 with DietPi. It’s great! Easy to use, feels really optimized.
10 years?! Wow! What’s that, like a Pi… 3?


I see. Thanks for the heads up! How much RAM do you have on that Pi 4? On my gaming rig torrenting alone can occasionally eat up 2Gb of RAM, but I haven’t limited anything there (if anything, I’ve increased various limits following the git readme of qBittorrent).


That fan/lid is to die for. Sic setup! Thanks for sharing! :)


Thanks! I’ll look into NFS!


No problem, that’s why I want to attach four 4TB SSDs :D


Thanks! Nah, I use bare bone sshfs to stream media (call me a lunatic) to a separate media player turned Lenovo T480 (which plays 4K just fine with a little indiscernible fan noise).


Well, I did not have to look far:
https://www.jeffgeerling.com/blog/2024/radxas-sata-hat-makes-compact-pi-5-nas/
But I still would love to hear any relevant anecdotes! :)


Gentoo and LFS to the Highs of Knowledge


A book about how to make medicine and food out of wild plants by some former military medic.


Emotions, soups and two upright eternity signs. You’re right. F…


Depending on where the alleged offenses were committed, not decrypting that for which the authorities have a warrant to analyze can be a crime in itself. I’m all for encryption, but without plausible deniability - something that VeraCrypt offers with their hidden volumes feature - encryption might by itself not get you far. Again, depending on the jurisdiction in question. And depending on whether the authorities really want to invest the time and money into “catching” one pirate. And, finally, at least encryption gives you the choice not to decrypt on demand. I just wanted to give encryption some nuance.


HOW COULD I MISS THAT OPPORTUNITY
crying myself to sleep


It had to be ‘toys’ and not, say, ‘loot’? 😳 Sorry, I hear what I wanna hear…


Dead serious question: I have only ever worked in the public sector (state level and local municipality) but often see or hear about these seemingly idiotic “interview questions” on television (and obviously memes).
Is this:
If 3, what on earth is its purpose and what could the interviewer possibly find out about the applicant by asking this?
I’m calm.


Thanks! I’m doing this on Linux, which I failed to mention in the post. I terminated the program with ctrl + c, but it was still interesting to me how such a short, seemingly uncomplicated snippet could tax my Ryzen 7 5800 X3D so much that the fans needed to increase their speed. Couldn’t a malicious actor theoretically disrupt a target machine by having an unnoticeably insignificant program loop in the background, taxing the CPU to it’s usable limits? This is off topic of course, but still interesting.


Thank you so much! :D Yeah, I noticed there were no remainders. I’ll try with float and see what I can come up with.
Bookmarked. I don’t know why. But, it is. Bookmarked now.