

I have read that modern servers have np. Bots you can add so you can do dungeons and stuff. I haven’t tried myself. Would love to find a guide on how to set up a Linux host.
I have read that modern servers have np. Bots you can add so you can do dungeons and stuff. I haven’t tried myself. Would love to find a guide on how to set up a Linux host.
I recently switched my instance from gitea to forgejo because everyone said to do it and it was easy to do.
It can be forked by anyone, but what is already out there will always be there.
And how does this hurt all of us who use it for open source projects?
To be honest, that seems like it should be the one thing they are reliably good at. It requires just looking up info on their database, with no manipulation.
That’s not how they are designed at all. LLMs are just text predictors. If the user inputs something like “A B C D E F” then the next most likely word would be “G”.
Companies like OpenAI will try to add context to make things seem smarter, like prime it with the current date so it won’t just respond with some date it was trained on, or look for info on specific people or whatnot, but at its core, they are just really big auto fill text predictors.
The network effect is real. You can have the best, most awesomely-designed social media platform ever and it will be useless if you are the only person on it.
You can try to convince all your contacts to switch away from whatever app is causing the most evil today, but you also have to convince all of your contacts’ contacts and all of theirs as well.
My mom is great at using the edit menu to copy and paste but I fear trying to get her to right click. What she does now works, so don’t mess with it.
I have my 80+ year old mom using Bitwarden. She has some issues creating new logins but for the most part it is working great on her desktop and her iPhone.
I have her pointed at my own Vaultwarden server and I know her master password if I really need to get in.
In high school we called it “Worship the Chicken Before It Destroys You”
Just Almond Joys and Mounds.
If your router/firewall is configured to let these broadcasts through you have a problem. If it is working correctly and you have an attacker on your lan? You have already lost.
I was thinking the same thing. The not wanting to know more is a really big red flag for me.
I love my shields, I have both the tube and the pro in different rooms. I like the Jellyfin AndroidTV app more than Kodi. I have side loaded a different launcher to avoid the ads.
I would love to try and replace it, but it needs to be able to handle 4K UHD rips with hdr and the original sound tracks in ATMOS or whatever.
Had to look it up. They mean Home Theater PC.
Side note. Don’t use hardware acceleration with TDARR. You will get much better encodes with software encoding, which is great for archival and saving storage.
Use hardware acceleration with Jellyfin for transcoding code on the fly for a client that needs it.
If you know what your client specs are, you can use TDARR to reencode everything to what they need and then you won’t have to transcode anything with Jellyfin.
You have a point that it will be hard to explain this to everyone on why it is better.
From my understanding, when you use a password manager, the user will enter a pw into it that they remember and the vault will unlock. Then when they go to log into a website, a different, longer, and impossible to remember password will be sent to the site at login. (Assuming they are using the manager well). A week later when they go to log in again, the same long password will be delivered.
The problem is that if a bad actor gets involved, whether it is the website is attacked or they send the user a phishing url or something and the password from the manager is exposed, it will have to be changed. That scammer can now log into that website as the user whenever they want, and possibly any other website that user used the same password for. Hopefully they didn’t if they are using a manager.
With passkeys, a user will log into their manager with a password they remember, but when they go to log into a website, a different token will be sent, based on their key, every time. So if a scammer is listening at the router they still can’t log in again because it has expired.
It is still not a perfect thing, I would imagine that phishing sites could still get a scammer in, who could possibly do bad things or change the login credentials but it is still much more secure than sending a password to the site for the user.
So what do y’all think about that?
I would do a full backup of how it is today and then try it out. What is the worst that could happen?
You are being downvoted but HFCS and honey are almost exactly chemically identical. They have to inspect honey farms to make sure it comes from bees since looking at the final product you can’t tell the difference.
Ahh yes, my favorite account on “x”. OqY4LO%&1Xv&e9YbRczM^nc3tD*f$4um3