It’s also worth mentioning that localsend has specific Linux support, so the app should run fine. I use it on my Linux laptop all the time!
It’s also worth mentioning that localsend has specific Linux support, so the app should run fine. I use it on my Linux laptop all the time!
I think it’s great! If we’re Mr and Mrs MyLastName we know they know me and assumed she was the same. If it’s Mr and Mrs HerLastName it means they know us through her, and assumed she must have gotten the name from me! It’s like putting the name of the company in the email you’re giving the email to, it tracks the source. At least that’s the game we play, because it mostly doesn’t matter to us.
I think the reason people are jumping to BDSM community terms is because BDSM people fucking love terms. They’ve got taxonomy for days, and they live to whip it out, so to speak.
You should look up IPFS! It’s trying to be kinda like that.
It’ll always be slower than a CDN, though, partly because CDNs pay big money to be that fast, but also anything p2p is always going to have some overhead while the swarm tries to find something. It’s just a more complicated problem that necessarily has more layers.
But that doesn’t mean it’s not possible for it to be “fast enough”
Knowing the folks at IA I’m sure they would love a backup. They would love a community. I’m sure they don’t want to be the only ones doing this. But dang, they’ve got like 99 Petabytes of data. I don’t know about you, but my NAS doesn’t have that laying around…
I’m not the person you’re replying to, and I don’t have any videos, but I do love dumping explanation on people! So here’s some terms:
File System: This is the way data is laid out in terms of actual bytes on the drive. It’s in charge of things like where to look to find the name of this file, or how to “last modified” date is stored, or how do I find out which files are in this folder. NTFS is a filesystem, whereas ext4 is probably the file system your linux machine is using. FAT is the older Windows one that’s still used on, like, SD Cards and stuff. That having been said File System is sometimes also used to refer to the particular data on a particular partition of a disk, like “the filesystem will allow” which really means the data on your NTFS partition. Filesystem is often abbreviated “fs”, and is in fact the “FS” of “NTFS”
Mounting: In unix systems, such as Linux, file systems are “mounted” to a place in the folder hierarchy. Everything in unix lives somewhere under the “root” folder /
, so mounting is basically saying “Okay, you want to see the files in this filesystem. Where should I put them?”, and if you say /home/user/stuff
then the file “one.txt” at the root of your filesystem will now be visible at /home/user/stuff/one.txt
", and if you mounted it at /mnt/things
it would be /mnt/things/one.txt
. The term mount is used like “attach” to mean “where do you want me to hang this new directory hierarchy on your existing one”.
fstab: There are a few ways to mount things in modern linux. The classic is the mount
command which looks something like mount /dev/sda1 /home/user/stuff
which would take the device with the name /dev/sda1
and mounts it to the given path. Devices in linux usually live in /dev
, and in this case are often given names like sda1
to represent the first hard drive (a
), and the first partition of that drive (1
). But, there are other ways! You can also click on the partition in your file browser and it will mount the disk for you, often auto-creating a mount path and cleaning it up when you’re done, so you don’t even have to think about it. Another way is fstab
, which is a kind of config file that controls mounting devices. In here you can give default options for how you want drives to be mounted, and can even specify that you’d like some devices to be automatically mounted by the system on startup. This is actually an important part of how unix systems start, and how the root filesystem and other important ones get going. If you wanted your NTFS drive to always be available at a permanent location, you would edit this file to set that up. If this is something you wanted only periodically, then just clicking may be fine.
Permissions: Virtually all unix filesystems store the permissions of files and directories as a “user” and “group” that owns the files, and then a set of whether or not the owner can “read” “write” and “execute” the file, whether other members of the group can, and then whether everyone else can. If two people were on the same computer, these would allow a person to be able to see their own documents, but not see the documents by other users. Or maybe they can see them but can’t make changes. And it also prevents random users of a system from changing important system configuration, when those config files are owned by the administrative user (called root
by convention). Some config files will be read-only to normal users, and some contain secrets and so are permissioned so normal users can’t even see them. But! NFTS doesn’t follow these same conventions, so when mounting an NTFS drive on unix the driver has to produce a set of permissions that are unix-compatible, but it doesn’t have anything to work off on the disk. So the person above was saying by default it assumes the safest option is to make all files owned by the user root
, and so if the permissions are the only the owner can write the files, and the owner is root
, this will mean it’s effectively “read-only” to you. The terms uid
and gid
stand for “user ID” and “group ID”, which are the numbers that represent a user in the data. User names are basically a convenience that allows us to give a name to a uid, but it’s more efficient to store one number everywhere on disk for owner rather than a name.
So putting it all together, what they’re suggesting is that you can use the /etc/fstab
file, which has a very particular format, to specify default options when mounting your drive. These options include setting the uid
option and gid
option to your user’s uid and gid, so that when the filesystem is mounted, it will appear that all the files are owned by you, so you’ll have full permissions on them. They’ve assumed your uid
and gid
will be 1000
because that’s a common convention, but if you’re comfortable you can run the id
command on the command line to output your actual uid and gid (you can ignore all the other groups your user is in for now)
They also mentioned that when mounting you can specify if you want to mount the filesystem as “read-only” or “read-write”, etc. If you mount the whole filesystem read-only, then the write permissions stored on the individual files are ignored, basically. So if you were mounting with a command, or through fstab, you should make sure the rw
option is present to clarify that you’re looking for “read write” permissions on your mount.
That having been said, it’s possible none of that is relevant to you if you’re mounting the fs by just clicking in your file browser. One way to tell is if you right-click on some file you aren’t allowed to edit and look at the properties there should be a Permissions
tab thing. And it will list the owner of the file and what access you have. If those permissions are already set to be owned by you, then this uid
thing is already taken care of for you by the file browser. In that case it might be something more fundamental to the NTFS filesystem, like the locks other people are talking about.
So those are some words and their meanings! Probably more than you wanted to know, but that’s okay. I liked typing it
I think I may have contracted some kind of brain worm, because the other day I needed to do some photo manipulation and couldn’t get krita to do what I wanted, but I went into gimp and just knocked it out. I’ve hated gimp for years, but I guess I’ve used it enough that I’ve figured out how it works… and now I don’t hate it anymore…
I think I may need help.
Oh, but I always use it in single window mode ever since that came out. The multiple windows floating panel thing drove me nuts!
I already responded somewhere else, but I have more response that doesn’t make sense in that context.
First, about deepening conversation. I don’t know about this guy, so I’ll talk about myself. I have things I’m interested in, let’s call them “interests”, and I like to talk about them. And the only thing that stops me from talking about them constantly to everyone is the social understanding that they don’t want to hear about my interests.
So all it takes to have me talk about stuff is enough questions to demonstrate you really want to know.
“What do you like about blah blah blah?” will probably get a short answer because he’s used to people not really wanting to know more, so he’s giving the smallest answer that answers the question. But then, you ask a question about his answer. “Huh, how is that different than blah blah?”
Now maybe longer answer, you listen and ask based on that, and if you can manage it you could also circle back to a previous answer to connect some dots. That’s now a discussion! Now, of course, you do have to listen. Unsure if that’s a skill of yours or not.
As for the asking out, I think you should do it. But if you don’t trust yourself to deliver the speech live, you could write it down / print it out. Just make sure it contains escape hatches for him that assure him it’s okay if he doesn’t share your feelings, and that he can just tell you if that’s the case, and probably ends by saying he doesn’t need to necessarily give you an answer now and you’re just happy you could get it off your chest. I think going for something casual is better than something heartfelt and romantic, but I don’t know the two of you. The most important thing is that he knows, and the second most important thing is that you don’t want it to wreck things if feelings aren’t mutual.
And if you don’t want to awkwardly read it, you could just hand it to him and let him read it at his own pace. This lets you watch his face while reading, if he makes facial expressions and if you can read them.
I would recommend against an email or a text, though. It feels like, from the bits of your personality I’ve picked up here, the time between when you send it to whenever he responds is going to be absolute torture for you. Whereas he might just be busy and not have even seen it yet, you’ll already be inventing bad scenarios and deciding which new city you should move to since you obviously can’t stay here, etc, etc 😉
So probably best to deliver it in person, maybe at the end of a hangout, so you can be sure he received it and read it. And I know you may be scared, but don’t tell him to read it after you’re gone, because that’s now email territory where you can’t ever know if he’s read it yet! Just have him read it, assure him it’s okay if he doesn’t agree, and let him respond. And even if he doesn’t have an answer now, you know it’s done.
Good luck!
I’m a man, my wife made the first move, and I’m very glad she did! Taking the step from friend (or even just acquaintances) to more is risky for anyone. But, and maybe I’m biased here, I think it’s currently even more risky for guys. Word can get around, and you’re more likely to not just lose the one friendship, but to be labeled “creepy” generally if you’re wrong. Of course it’s possible for that to happen to a woman, but it’s way less likely for a woman to be perceived as a creep in general, and also men don’t talk amongst themselves the way women tend to.
Anyway, I knew my wife from a social space, and I didn’t want to be the guy who poisoned the environment and made it an uncomfortable location for women by pursuing any of them. So I was friendly and tried to be as non threatening as possible, which meant no asking out. So I was very relieved when she made a move!
Don’t know if your situation is anything like that, I’m just unsure of your source that says “active woman means short term”. I mean, think of all the dudes hitting on strangers in bars which either turns into a one night stand or a short fling. The averages have got to be better than that, right?
I’m not 100% sure it’s being used correctly here, but entrapment in general is when a police officer convinces or coerces a person into committing a crime, and then arresting them for that crime. So, if a police office is standing somewhere and you walk up to them and ask to buy drugs, they can arrest you for that. But if they are like “hey man, want to buy some drugs? Come on, it’s only $10. You know what, for you, first time is free. Just take them”, and then you take them, that is entrapment.
The reason entrapment is problematic is because it’s hard to tell if you would have committed a crime, had the officer not pushed you into it. Maybe you were just feeling pressured and wanted the uncomfortable situation to go away, etc.
As for not exposing entrapped people, there is this moral dilemma in general that often gets dramaticized in cop shows and movies, which is that the person we know is guilty gets away on a technicality or procedural issue. And at first blush that looks like a flaw. But actually it’s more like the lesser evil of a bad situation. Because what we don’t want is police using powers that erode the freedoms of the innocent people, like breaking into people’s homes and going through their stuff, or wire tapping, or torture, or whatever. Things we don’t want police to do to innocent people.
If doing these things were “frowned upon”, but we still used the information we gained from it anyway, then it would be a viable police strategy. It’s a cost of doing business, but it gets the job done. Even if a single officer got fired for it, they could choose to matryr themselves to do the bad thing and get the guy. But we don’t want cops doing these things, because anything they do against a person they think might be guilty is something they could be doing to a person that’s actually innocent. So we kinda have to make the rule be that any information, no matter how good, that was gotten in a bad way becomes bad information that we all agree never to use. Because that’s the only way to make sure the police don’t want to do the bad things.
It may let some guilty people go free, when the police screw up, but in theory it protects all of us against an escalating police state.
I don’t normally do this, but I see this from time to time, so just so you know:
wary: feeling or showing caution about possible dangers or problems.
leery: cautious or wary due to realistic suspicions
weary: feeling or showing tiredness, especially as a result of excessive exertion or lack of sleep
I’m sorry if this was annoying rather than helpful!
Also that’s not even a prism, that’s a pyramid…
While others have convinced me to just replace the whole gang, this is pretty cool! I’m kinda glad someone is making them, though I am a little curious to know how they’d look all assembled together… I feel like the seams would be pretty noticeable…
You know… I hadn’t even noticed that outlet wasn’t GFCI… Ha!
Ok, you (and everyone else in thread) are right, the idea of rewiring the whole box wasn’t appealing to me, but if I’m being objective it’s actually not that much work and is probably less money overall than the smart switch itself.
Thanks folks, for shaking the blinders off me!
100% you can do it with some good instructional content and a smidge of patience!
A standard lock is disturbingly easy to pick… We used to run a booth at a maker event where we taught members of the public passing by including, like, 5 year olds to pick padlocks.
Unrelated, but BTW there are some jurisdictions if I’m not mistaken where having lock picking tools found on you is considered “criminal intent” or something, but on the other hand if you’re already at the point where your bag is being searched you may already be boned…
Yes, I do have a soft spot for Netscape Navigator. It will always be my first…
I used to use Firefox before Chrome came out, because it was better than IE. When Chrome came out it was a breath of fresh air. A real third option! (konqueror didn’t really count). And it was faster, cleaner, lighter than Firefox. Just better at everything. So I installed it on all of my family’s computers, which they allowed me to do because IE by then was so bad it was an obvious improvement even for the layman.
Then in the intervening years Firefox dwindled to basically no market share and IE died, so now Chrome isn’t a third option, it’s the only option. And so I switched back to Firefox basically as a political sacrifice, but there’s no way I’m going to be able to convince any of my family to switch because Firefox isn’t better for them in any perceivable way. It’s just different and they don’t care. If Firefox had 30% market share I’d almost definitely be using Chromium still myself.
So probably that, but a million times. There was a period where every nerd moved all their associated people to Chrome because it was new, great, and non-dominant. It was hip and indie. And now they’re still there and there’s no reason for them to move that they care about.
Ok, let me rephrase your rephrase to be what question I think you’re trying to ask.
At some point we had decided on a seven day week with week names. That’s fine. But we must also have decided at some point that today was Wednesday in this system.
So I think you’re asking “what is the first day we all agree was definitely a Sunday, such that all Sundays after were based on that”. Or put another way, at what point did the days of the week get locked to the days of our year.
I don’t have that answer, but your question confused me, so I’ve reworded it.
I’m going to give you the benefit of the doubt and assume what you said was simply confusing, but not wrong.
So just to be clear if your raid array fails, and you’re using software raid, you can plug all of the disks into a new machine and use it there. But you can’t just take a single disk out of a raid 5 array, for example, and plug it in and use it as a normal USB hard drive that just had some of the files on it, or something. Even if you built the array using soft-raid.