cultural reviewer and dabbler in stylistic premonitions
i guess your computer’s power button might not be supported (out of the box, at least) by Linux’s acpi implementation :(
It’s free software which you can host yourself. The source is here (GPLv3). You can read more about the people that make it here: https://en.wikipedia.org/wiki/Framasoft
because you carefully photoshopped the silhouette of a prone person into the bar graph
just in case Ars Technica has to remove it someday (perhaps for licensing reaasons? 😭), i am pasting a screenshot here of the excellent image illustrating this article:
(disclaimer: this information might be years out of date but i think it is still accurate?)
SSH doesn’t have a null cipher, and if it did, using it still wouldn’t make an SSH tunnel as fast as a TCP connection because SSH has its own windowing mechanism which is actually what is slowing you down. Doing the cryptography at line speed should not be a problem on a modern CPU.
Even though SSH tunnels on your LAN are probably faster than your internet connection (albeit slower than LAN TCP connections), SSH’s windowing overhead will also make for slower internet connections (vs rsync or something else over TCP) due to more latency exacerbating the problem. (Whenever the window is full, it is sitting there not transmitting anything…)
So, to answer OP’s question:
--rsh=ssh
as that is the default).man rsync
and read the section referred to by this:
The remote-shell transport is used whenever the source or destination path contains a single colon (:) separator after a host specification. Contacting an rsync daemon directly happens when the source or destination path contains a double colon (::) separator after a host specification, OR when an rsync:// URL is specified (see also the USING RSYNC-DAEMON FEATURES VIA A REMOTE-SHELL CONNECTION section for an exception to this latter rule).
HTH.
meme culture is arguably a subset of that thing called “remix culture”, but, the guy who coined that term and created Creative Commons to support it was tragicomically mistaken about the viability (not to mention actual utility) of his efforts to get participants in it to care about engaging with copyright law via copyleft licenses.
so, i think the answer to your question is: probably not.
“hmm, i should find an appropriately licensed image to use” is not something most practitioners of applied memeography have ever said or will ever say (at least until general-purpose computers are actually outlawed, such that casual copyright infringement becomes non-trivial). imo. 🤡
(my contribution to lemmy’s beans arc)
(it’s odd that PBS is promoting this, as it is actually a terf movement)
Lets Enhance is a pretty great supercut, but nothing beats the original Blade Runner scene.
enhance 224 to 176
enhance, stop
move in, stop
pull out, track right, stop
center and pull back, stop
track 45 right, stop
center and stop
enhance 34 to 36
pan right and pull back, stop
enhance 34 to 46
pull back, wait a minute, go right, stop
enhance 57 to 19
track 45 left, stop
enhance 15 to 23
give me a hardcopy right there
only hobbyists and artisans still use the standalone carrot.py
that depends on peeler
.
in enterprise environments everyone uses the pymixedveggies
package (created using pip freeze
of course) which helpfully vendors the latest peeled carrot along with many other things. just unpack it into a clean container and go on your way.
that flag is upside down 🤘
Funny that blog calls it a “failed attempt at a backdoor” while neglecting to mention that the grsec post (which it does link to and acknowledges is the source of the story) had been updated months prior to explicitly refute that characterization:
5/22/2020 Update: This kind of update should not have been necessary, but due to irresponsible journalists and the nature of social media, it is important to make some things perfectly clear:
Nowhere did we claim this was anything more than a trivially exploitable vulnerability. It is not a backdoor or an attempted backdoor, the term does not appear elsewhere in this blog at all; any suggestion of the sort was fabricated by irresponsible journalists who did not contact us and do not speak for us.
There is no chance this code would have passed review and be merged. No one can push or force code upstream.
This code is not characteristic of the quality of other code contributed upstream by Huawei. Contrary to baseless assertions from some journalists, this is not Huawei’s first attempt at contributing to the kernel, in fact they’ve been a frequent contributor for some time.
Wasn’t Huawei trying to put a Backdoor into linux?
as far as i know, that has not happened.
what makes you think it did?
weird, i wonder why. i just checked on an ubuntu 24.04 system to confirm it is there (and it is).