=== ANCHOR POEM === ══════════════════════════════════════════════════════════════════════════───────── apparently you can use network sockets for inter-process communication if you just set the network to your home and the ports that are set to the defaults that people who know what software you use will know to listen on when they've hacked any single device on your network. good thing that data is with the router, right? what if there was a stop before leaving the computer? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘ === SIMILARITY RANKED === --- #1 fediverse/2622 --- ══════════════════════════════════════════════════════───────────────────────────── what kind of linux user are you if you don't even like reading terminal output? it's USEFUL and INTERESTING information! WHY ELSE WOULD THE PROGRAMMER OUTPUT IT??? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘ --- #2 fediverse/3890 --- ══════════════════════════════════════════════════════════───────────────────────── Linux is great! It can do anything you want it to. Except that thing you want it to do. Why don't you go fix it? It's not hard, all you have to do is run these configure files or operate this doohickey and BAM suddenly you got apes writing machine gun regulation software [I don't think those two things are related] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════────────────────────────┘ --- #3 fediverse/5913 --- ══════════════════════════════════════════════════════════════════════════───────── Did you know that any wifi chip can be used as both a sender and a receiver? how do you think you'd get data in and out of the device? trick is... you don't actually need a router. How fun is that! ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘ --- #4 fediverse/1870 --- ═════════════════════════════════════════════════════────────────────────────────── why would I want other people using my computer? They don't know how to use my computer! They might break something or mess something up or automatically read/edit my files that are stored in standard locations through the usage of a script which automagically scans and ransomwares machines on the internet who store their files in specific standardized locations! no thank you. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════════════─────────────────────────────┘ --- #5 fediverse/5950 --- ══════════════════════════════════════════════════════════════════════════───────── @user-138 wao I'm a cool kid _^ Hmmmm I googled "Network: file exists" and got this link: https://access.redhat.com/solutions/1340713 my understanding of that is that maybe you're creating static routes, and for some reason you're trying to create one that already exists? Maybe there's something in your .bashrc config, if the file appears when you open a terminal, or perhaps if it appears randomly then maybe there's a service or something that's doing it. Did you say it stopped when you swapped sim cards? ... on your phone? that's bizzare... Maybe you were trying to create an ip route (whatever that is) that was pointing to the same ip address as your phone? and when you swapped sims it changed the ip address? If it appears again, maybe try setting static IP addresses for both the phone and the computer in your router settings and see if that fixes it. Though if you've ever seen the error while out and about at like, a coffee shop or library or whatever, then that wouldn't apply since the router is only for home base... ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘ --- #6 fediverse/5109 --- ═══════════════════════════════════════════════════════════════════──────────────── does anyone know of a website where I can host videos on my neocities that isn't youtube? maybe something I can set up on my own server computer at home like a file server or something? how do I do that, what should I google, which is the easiest and closest to the metal tools I can use? [practical, sensible, courageous. these are the adjectives we need.] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════════════───────────────┘ --- #7 fediverse/5291 --- ═════════════════════════════════════════════════════════════════════────────────── the most important skill I can think of for a linux software engineer is the ability to connect multiple systems together and turn windows and macintosh devices into Linux devices so that datacenters can be built out of whatever's on the around. there's this programming language I like called Chapel for distributed computation computing which is also cool, if you're more of the programming type. networking security I believe often has hardware solutions, so getting the crypto-graphy boys and the PCB girls together to work on some jams is a good and productively useful gathering of insightful events "but ritz computers should only be used to solve problems that people have, not make more problems!" ah yes but have you considered that problems find you, and the computers help you work through them ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════════════════════════════─────────────┘ --- #8 fediverse/3234 --- ╔═══════════════════════════════════════════════════════───────────────────────────┐ ║ ┌────────────────────────────────────────────────────────────────┐ │ ║ │ CW: ritz-is-fucking-stupid-I-guess-oh-whoops-cursing-mentioned │ │ ║ └────────────────────────────────────────────────────────────────┘ │ ║ │ ║ │ ║ my understanding is that anyone with my IP address could make my heart bleed │ ║ due to a hardware vulnerability on my motherboard. Though you might have to │ ║ get past my decrepit ancient linksys EA 3500 router from 2012 first. │ ║ │ ║ unrelated, but does anyone want my IP address? I don't have any remote │ ║ backups, so if you hate me now would be a great time to show me how despised I │ ║ am. Alternatively you could try searching for anything evil to ensure that I │ ║ can be trusted. You're gonna find mostly video games and source-code that I │ ║ didn't write though. But also all my notes in directories that are │ ║ non-standard, meaning you'll have to look around a bit. I leave little notes │ ║ everywhere I go, so that I can remind myself how to do things in the │ ║ directories I revisit months later. It's so weird how sometimes the things I │ ║ wrote stop working after a while even if I didn't update my system lmao │ ║ │ ║ what is it with artists and self-immolation? "I never thought I'd actually di │ ╟─────────┐ ┌───────────┤ ║ similar │ chronological │ different │ ╚═════════╧════════════════════════════════════════════────────────────┴──────────┘ --- #9 fediverse/2601 --- ══════════════════════════════════════════════════════───────────────────────────── @user-249 you can host anything you'd like on a raspberry pi. If the software requirements are within the hardware specs, of course. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘ --- #10 fediverse/2674 --- ══════════════════════════════════════════════════════───────────────────────────── ┌────────────────────────────────────────────────────────────────────┐ │ CW: factually-untrue,-that-never-happened.-this-is-just-gesturing. │ └────────────────────────────────────────────────────────────────────┘ the kind of friendship where you SSH into each other's systems and leave notes for one another. as soon as you find one you message the person who left it like "yoooo only just found this lol" and they're like oooo yeah did you see the bash script I wrote in that directory "yeah totally I used it on one of my video files just now - cool filter!" ahhhh reminds me of all the times hackers have hacked my permanently insecure system and left me friendly messages like "hey I'm on your side" or "how's life, friend? I hope it's going well." or "never forget; you are worth all the fear" y'know cute things like that oh. right. because leaving vulnerabilities like that can lead to threat actors affecting your stuff. how lame. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘ --- #11 fediverse/5110 --- ═══════════════════════════════════════════════════════════════════──────────────── I'll give ya a hint - encrypt the return IP address WITHIN the packet's data package repository area itself, rather than trusting your "router" to return it to sender. YOU DON'T KNOW WHO IS SENDING A PACKET that's the whole point of udp (actually udp is when it doesn't matter if it got snatched in transit. Usually used for more analog data streams like netflix or hulu prime.) ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════════════───────────────┘ --- #12 fediverse/3470 --- ════════════════════════════════════════════════════════─────────────────────────── alternatively, when you initiate an SSH session it sends you a randomized public key whose private key is the password that you need to login. By decrypting the string of text it sent you and sending it back (plus the password at the end or whatever) you can ensure secure authentication without bothering with the passwordless keys which are wayyyyyy more trouble than they're worth and lack the "something you know" authentication method. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #13 fediverse/4900 --- ════════════════════════════════════════════════════════════════─────────────────── if you wanna trick systems administrators just put a bunch of sleeps in your code so your computer programs don't use up all the mainframe's resources all at once [statements dreamed up by the practically deranged] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════════════──────────────────┘ --- #14 fediverse/3631 --- ════════════════════════════════════════════════════════─────────────────────────── ┌────────────────────────────────┐ │ CW: re: computer-toucher-stuff │ └────────────────────────────────┘ @user-883 I have a different port for my desktop and my laptop just in-case the router forgets to check the postmarked address on the packets it receives... at least it'll know which port to send it to! ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #15 fediverse_boost/2965 --- ◀─╔═════════════════════[BOOST]═══════════════════════───────────────────────────╗ ║ ┌────────────────────────────────────────────────────────────────────────────┐ ║ ║ │ i will use CW for #USpol if computer people start using CW for tech computer boring linux software posting. i said what i said │ ║ ║ └────────────────────────────────────────────────────────────────────────────┘ ║ ╠─────────┐ ┌───────────╣ ║ similar │ chronological │ different ║ ╚═════════╧═════════════════════════════════════════───────────────────┴───────╝─▶ --- #16 fediverse/3469 --- ════════════════════════════════════════════════════════─────────────────────────── you know how SSH password login is deprecated because the password needs to be transmitted in cleartext or whatever? what if we just... required two passwords? the first initiates the conversation, and sets up an encrypted line. It doesn't matter if anyone sees the first password because they'll get a new set of encrypted keys, meaning each session automatically is encrypted in a different, randomized way. the second password is the one that actually authenticates you. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #17 messages/1245 --- ═════════════════════════════════════════════════════════════════════════════════── BRB, if you want to talk to yourselfs, I recommend opening a port in your router and exchanging HTTP packets that create messages on each other's computers. Can be done in a couple hundred lines of C code that can be 90% premade or auto-generated. Then, once it's made, you don't have to think about it again because it's so simple. It's not trying to scale, it's just... designed for a small, focused, human oriented mindset.\ ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════════════════════════════════════════─┘ --- #18 fediverse/5919 --- ══════════════════════════════════════════════════════════════════════════───────── "but... why?" portable linux with buttons, great for pick-up-games or communication, can throw several in them in a backpack if you want clustered cooperation, they work as radios (if the signal reaches) and can transmit text (if you use a radial-style keyboard) [this is all just a pitch for... something, what, you want something? ha you'll find no things with me, I know nothing of antifa or whatever] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘ --- #19 fediverse/5850 --- ══════════════════════════════════════════════════════════════════════════───────── @user-1074 if you'd like I can give you a lua script which will take your fediverse archive and turn it into a pdf which you can edit or print or whatever. Might be a fun diversion from posting. You can reply to yourself, add clarifications, change some things, put things in a new light, add context, etc... before you know it you'll have something printable. Could even pull out your best stuff and make zines. should require just a little configuration to suit your setup. That's part of how I stay "productive" without posting all the time. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘ --- #20 fediverse/1611 --- ╔═══════════════════════════════════════════════════───────────────────────────────┐ ║ @user-1040 │ ║ │ ║ well, usually in the examples I shared like tumblr posts there's a username │ ║ and picture shown. But tumblr users change their names, while on Mastodon (at │ ║ least on my client) it shows your permanent handle underneath your regular │ ║ changable name. I guess you could migrate accounts to another server if you're │ ║ being harassed in one place, but still people have a way of finding you. It's │ ║ weird kinda makes me wonder if they track you by ip address haha - did you │ ║ know that every computer attached to a router uses the same public IP address? │ ║ Then it uses either DHCP or static assigned local addresses for every computer │ ║ on the network. That's pretty neat! I wonder why we don't have workstations by │ ║ default include a router (and modem)? Seems like pretty important tech that │ ║ should be built into the chassis instead of in a small separate unit. Like, │ ║ what if you had to throw all your belongings into a van and drive to a motel │ ║ somewhere to set up your workstation in a hotel because it's hot and your ac │ ║ broke lol │ ╟─────────┐ ┌───────────┤ ║ similar │ chronological │ different │ ╚═════════╧════════════════════════════════════════────────────────────┴──────────┘ |