• 0 Posts
  • 20 Comments
Joined 2 years ago
cake
Cake day: June 13th, 2023

help-circle

  • Rosetta and proton are two completely different layers.

    Game porting toolkit is indeed also based on wine, but that’s only the conversion of directX to ogpl or vulkan (using metalVK in Apple’s case)

    Rosetta is a completely separate harware accelerated (as in, the chips have dedicated hardware for this) translation layer for x86 to ARM

    Given the lengths they had to go through to get even this custom APU, I can only imaging the difficulty in procuring a first-gen ARM offering from AMD.

    I swear, this is just the “VR is really here, and it’ll replace conventional gaming!” Debate all over again. I’d be surprised if it happens in the next two years. After that? Maybe, if x86 doesn’t catch up more than it already has (which I fully expect it to do).



  • Apple’s M-chips have dedicated hardware to accelerate rosetta 2 (support for x86 memory ordering), please stop using rosetta2 as a show of what x86 on ARM can do, as it is a vertically integrated piece of software that is not indicative of the current market for anyone outside of apple.

    Just take a look at windows on those new qualcomn chips - when they do the translation, the performance is underwhelming to say the least.

    Yes, it will improve, but it currently does not exist outside of Apple.




  • I looked into distros using plasma 6 for a bit, but decided it wasn’t worth the hassle. It’s also a not trivial boot setup (dual boot with w11 and bitlocker + LUKS + secureboot) and the (k)ubuntu installer just handled it flawlessly (meaning not having to enter my bitlocker key on every boot)

    Works fine for me (except some weird locale issue, but I knew that in advance)




  • It’s quite common to login as admin on windows though (in home setups), you’ll still have to authenticate for administrative tasks (the UAC popups).

    The issue here is mostly that the user has probably upgraded and windows changed their account, resulting in the files being owned by their old account.

    In linux, that’s fixable with ‘sudo chmod -R’

    In Windows, there’s no built-in way, you need the take ownership script.





  • Wireguard (which is what tailscale is built on) doesn’t even require you to open ports on both sides.

    Set up wireguard on a vps first, where it is accessible, then set it up from within your network. It’ll traverse NAT and everything, and you don’t have to open a port on your network.

    Tailscale is the exact same thing, just easier because it does everything for you (key generation, routing, …). Their service replaces your vps, up to you if you think that’s acceptable or not. IMHO, wireguard is worth learning at least. I eventually (partially) switched to tailscale because I’m lazy, and all services I host have authentication anyway, with vpn just being a second layer.


  • Lemzlez@lemmy.worldtoProgrammer Humor@lemmy.mlC++ Moment
    link
    fedilink
    English
    arrow-up
    4
    ·
    10 months ago

    it’s still comically bad compared to various alternatives, even apples-to-apples alternatives like C#.

    I’d be interested to hear why. IMO Java has the superior ecosystem, runtime(s!), and community. The best part is that you don’t even HAVE to use java to access all this - you can just use kotlin, groovy, scala,… instead.

    In terms of the language itself, while it (still) lacks some more modern language features, it has improved massively in that area as well, and they’re improving at a significant rate still. It also suffers from similar issues as PHP, where it has some old APIs that they don’t want to get rid of (yet?), but overall it’s a solid language.





  • I don’t think programming language is a good metric for security. I assume everything I host has issues, and then try to mitigate from there.

    IMHO, a better approach is to vet the project beforehand, looking at whether it is still actively maintained. I usually use things like commits, issues, etc to try and gauge whether a piece of software is actively maintained so that when an issue arises, it can be fixed.

    You can mitigate much of the risk by using some basic best practices, like isolating all apps from each other (using docker, for example), using a reverse proxy, tools like fail2ban or a web application firewall, using proper database permissions for each app, etc

    What I also do is add another layer by making certain applications accessible only over vpn. That won’t work for some tools, obviously, but also reduces the risk for tools you are only using yourself.