University of Minnesota, I remember it well. Considering the importance of the Linux kernel, a lifetime ban and retroactive removal of their contributions was the most polite “fuck off and never come back” they could’ve received. I personally would’ve accused them of sabotage.
I take my shitposts very seriously.
- 1 Post
- 119 Comments
It’s probably there to defeat the “well, you didn’t tell me not to add malware!” defense.
rtxn@lemmy.worldto Programmer Humor@programming.dev•How I, a non-developer, read the tutorial you, a developer, wrote for me, a beginner - annie's blog278·9 days agoIs “prerequisite knowledge” a foreign concept to people these days? When I started writing extensions for Blender, I had to do a lot of legwork to understand the
bpy
module, and even more fucking legwork to understand Python itself, all that on top of the general knowledge of programming and algorithms from high school.RTFM means that you should use the available resources to learn. There’s a whole internet full of them. There are no shortcuts to understanding, and you can’t expect every task-oriented guide to explain how to write a
main()
.
In the real world, the only thing better than perfect is standardized.
Fun fact:
C:\:
is a perfectly valid NTFS path. Windows won’t let you create it, though, because Windows doesn’t even fully support the NTFS specification. That’s why you have to specify thewindows_names
option when mounting an NTFS filesystem on Linux.
rtxn@lemmy.worldto Selfhosted@lemmy.world•Is it possible to make WoL unicast work indefinitely?English2·11 days agoThe most straight-forward method would be to buy a standalone switch. I have a TP-LINK TL-SG108 8-port gigabit switch and it seems to retain the ARP table indefinitely.
My previous solution was an ESP32 board with an SSH server and a relay, wired parallel with the power switch, that would be closed by an output pin on command.
rtxn@lemmy.worldto Selfhosted@lemmy.world•Can someone test if it's their computer that loads my site too?English14·12 days agoHow much experience do you have with networking, exactly?
The DNS record points to a private IPv4 address (10.0.0.41), which cannot be accessed from the internet for multiple reasons; first of which is that it’s almost certainly behind a NAT gateway.
Your internet provider has given you a single publicly routable IPv4 address and assigned it to the WAN interface on your modem or router. If you want to access a host on the LAN, you’ll first have to configure port mapping or port forwarding on the router. Then you’ll have to open holes in your firewall and accept the fact that every bad actor will try to break into that host unless you know how to set up network security.
Linux has two different kinds of “used” memory. One is memory allocated for/by running processes that cannot be reclaimed or reallocated to another process. This memory is unavailable. The other kind is memory used for caching (ZFS, write-back cache, etc) that can be reclaimed and allocated for other things as needed. Memory that is not allocated in any way is free. Memory that is either free or allocated to cache is available.
It looks like
htop
only shows unavailable memory as “used”, while proxmox shows the sum of unavailable and cached memory. Proxmox “uses” 11 GB, but it’s not running out of memory because most of it is “available”.
Not on my own, I’m technically only responsible for the network and cybersecurity, but not being able to log out of an education account on a public computer is a pretty serious threat. Fortunately I’m on good terms with the dean and he’s always been receptive to my concerns.
As a university sysadmin that spent half a fucking hour yesterday trying to log someone out of a classroom computer’s MS Office software (the “sign out” button did fuck all, go figure): fuck Microsoft, fuck Office, fuck Outlook, fuck Onedrive, fuck their SSO, and their mother too. Next semester I’m sanitizing the computers. Students will use LibreOffice and they’ll like it.
I might be a little angry.
Fuck it. *uses
ulong
to store a boolean*
Proxmox is a great starting point. I use it in my home server and at work. It’s built on Debian, with a web interface to manage your virtual machines and containers, the virtual network (trivial unless you need advanced features), virtual disks, and installer images. There are advanced options like clustering and high availability, but you really don’t have to interact with those unless you need them.
Well that’s not true. I live in a Soviet era house that had an entire second floor built on top of it. We’ve had to drill through the brick walls to replace the natural gas pipes with pipes that run outside the walls, we’ve had to dig under the foundation when we got connected to the city’s sewer system (again, Soviet-built), and again when the main water pipe burst and threatened to wash out the foundation. If the load-bearing walls had been constructed to the same “it works” standard as the things we’ve had to fix, we wouldn’t have a house anymore.
rtxn@lemmy.worldto Programmer Humor@programming.dev•I'm new to using Ruby and this tickled me pink271·1 month agotimedelta
marks time in days, seconds, and microseconds. It doesn’t take leap years into account because the concept of years is irrelevant totimedelta
. If you need to account for leap years, you need a different API.
rtxn@lemmy.worldto Selfhosted@lemmy.world•Why are anime catgirls blocking my access to the Linux kernel?English382·1 month agoNew developments: just a few hours before I post this comment, The Register posted an article about AI crawler traffic. https://www.theregister.com/2025/08/21/ai_crawler_traffic/
Anubis’ developer was interviewed and they posted the responses on their website: https://xeiaso.net/notes/2025/el-reg-responses/
In particular:
Fastly’s claims that 80% of bot traffic is now AI crawlers
In some cases for open source projects, we’ve seen upwards of 95% of traffic being AI crawlers. For one, deploying Anubis almost instantly caused server load to crater by so much that it made them think they accidentally took their site offline. One of my customers had their power bills drop by a significant fraction after deploying Anubis. It’s nuts.
So, yeah. If we believe Xe, OOP’s article is complete hogwash.
rtxn@lemmy.worldto Selfhosted@lemmy.world•Why are anime catgirls blocking my access to the Linux kernel?English23·1 month agoThat’s why the developer is working on a better detection mechanism. https://xeiaso.net/blog/2025/avoiding-becoming-peg-dependency/
rtxn@lemmy.worldto Selfhosted@lemmy.world•Why are anime catgirls blocking my access to the Linux kernel?English3·1 month agoWith how much authority you wrote with before, I thought you’d be able to grasp the concept. I’m sorry I assumed better.
rtxn@lemmy.worldto Selfhosted@lemmy.world•Why are anime catgirls blocking my access to the Linux kernel?English4·1 month agoTHEN (and this is the part you don’t seem to understand) the client process has to waste time solving the challenge, which is, by the way, orders of magnitudes lighter on the server than serving the actual meaningful content, or cancel the request. If a new request is sent during that time, it will still have to waste time solving the challenge. The scraper will get through eventually, but the challenge delays the response and reduces the load on the server because while the scrapers are busy computing, it doesn’t have to serve meaningful content to them.
rtxn@lemmy.worldto Selfhosted@lemmy.world•Why are anime catgirls blocking my access to the Linux kernel?English6·1 month agoIt’s not client-side because validation happens on the server side. The content won’t be displayed until and unless the server receives a valid response, and the challenge is formulated in such a way that calculating a valid answer will always take a long time. It can’t be spoofed because the server will know that the answer is bullshit. In my example, the server will know that the prime factors returned by the client are wrong because their product won’t be equal to the original semiprime. Delegating to a sub-process won’t work either, because what’s the parent process supposed to do? Move on to another piece of content that is also protected by Anubis?
The point is to waste the client’s time and thus reduce the number of requests the server has to handle, not to prevent scraping altogether.
You make a new normal, non-root user specifically to run Radicale processes. The user should have write access only to Radicale’s directories, nothing else.
Same deal with Apache and the
www-data
user.