

Pff. You really think food grows on trees?
Pff. You really think food grows on trees?
Please spread this message to more advanced Software engineers who understand “BYTECODE” HIDING and exe construction IN OPENSOURCE SCRIPTS AND HAVE THEM TAKE A LOOK AT IT!
I believe chain letter is the word?
The pig belongs to all mankind!
Exposing Jellyfin/ plex through routing or SNAT plus dyndns would be a cheap option.
As soon as one rents a VPS (to expose the selfhosted at home service through routing/ tunneling) it would cost at least 2€/ month?
That’s good and all. But we should go deeper.
For instance, what’s the conversion factor to planck lengths per unperturbed ground-state hyperfine transition of the caesium 133 atom (second) or maybe even per Planck time unit?
Damn. Another rabbit hole to dive into. Thanks… I guess. :)
The lua queries look promising.
Have fun. :)
Side note: Never look at LXC/incus or home assistant or esp32 to attach. Rabbit holes everywhere.
Yes, broad is fine. It’s interesting to see the different approaches. :) I’m sorry if I sounded too harsh.
My understanding was that Germany’s issue is with uploading as well, but I am not German and I am not a lawyer
Lawyer? Me neither.
Indeed. Uploading is problematic, which includes p2p. Downloading not so much. Still illegal though.
There was the story about witcher and CD project who targeted illegal users. Understandably. So downloading isn’t exactly 100% safe. Or using the downloads…
Distribution is the key here, which they can pinpoint to your IP. They can’t come after YOU specifically (usually) but they contact your ISP
Germany:
Which in turn hands out your contact data. And Waldorf + Frommer will send you a form for a Unterlassungserklärung, which you are kindly asked to sign. Plus they will kindly ask for a few hundred euros.
Who then sends you a strongly worded letter about stopping (usually). If this happens repeatedly they will often throttle your bandwidth or even cut you off. Again, usually. This is different everywhere.
Nope. Not the ISPs job here.
Most of the time these abstracts are fine. But I’m wary of it because of the cases where it doesn’t. :)
Yes. It’s normal human behaviour. There is a hype, then a bubble, then… normalization.
Multimedia, keychain, blue LEDs, curved LCD screens, LLMs,… One of them is way less useful than the others.; P
LLMs seem to be great for translations and… transcriptions?
In your case: no need for a fw if you can trust your local network.
Generally: services can have bugs - reverse proxy them. Not everybody needs to access the service - limit access with a firewall. Limit brute-force/ word-list attempts - MFA / fail2ban.
It has a superset of features compared to the Explorer - Meaning it can do all the things that the explorer can do plus more.
I’m simply used to the two window layout since the old ages of Norton Commander ( Yes, Norton used to create useful products back then.). For me it is about hotkeys for functions ( Select, Filter, Copy, paste, move, delete). A multi rename tool. A search for file contents. A copy queue.
I do not use it for everything, but sometimes it’s simply better than the standard windows tools.
Tripwire and auditd can monitor a filesystem and notify you about changes. I don’t know the tools myself, because i never needed them. Maybe these can give you a hint on the responsible service.
If you suspect a certain service to be responsible: what do the logs of the service say? If nothing: increase the loglevel to info or debug?
Sorry. No solution. Just ideas. Good luck.