• 0 Posts
  • 26 Comments
Joined 1 year ago
cake
Cake day: June 19th, 2023

help-circle



  • don’t use plastic if you can avoid it. It’s not easy to recycle.

    Plastic bags, styrofoam, and those hard plastics marked types 1 & 2 are the ones most likely to be recycled into new products. They are easy to break down and recycle into new containers.

    Hard plastics marked types 3 through 7 are most likely to be filtered out and either incinerated or dumped straight into the landfill, as it costs more to recycle them than to just create new straight from oil.


  • Unfortunately, most plastics are useless to recycle - they either get incinerated or dumped straight into the landfill by the companies who collect and filter them.

    Which is why my wife and I only bother with plastic bags, styrofoam, and the hard plastics marked types 1 & 2. These are the plastics which are easily recyclable, and therefore, have a non-trivial chance of actually being recycled.

    We put types 3 through 7 straight into the trash, as they have about a 97% chance of not actually getting recycled.




  • His router is tri-band though meaning it has 2 5ghz transceivers.

    Unfortunately, for many models - like the Linksys WRT 3200ACM - that second antenna (technically the third one if you include the 2.4Ghz one) doesn’t function at all without the manufacturer’s firmware. It’s a dead stick with any third-party firmware, and is 100% software-enabled.

    I have found this fact to be reliable whether it is DD-WRT or OpenWRT, and across several different manufacturers including Asus and D-Link.


  • Our civilization demands that I be profitable to a parasite who leeches a majority of my labour’s value in order to accumulate obscene levels of wealth.

    Without exorbitant amounts of time spent maintaining that profitability, I will end up poor, homeless, and eventually dead from exposure. This leaves vanishingly little time to spend on open source work, regardless of how intellectually and ethically attractive it may be.





  • when it wasn’t actively sexually harrassing T’pol

    I never understood that need. T’pol was already fiercely exotic, what with her flawless face and remote Vulcan disdain. They could have put her into a spacesuit for the entire series and she would have still been attractive AF purely due to her personality and strength of character. About the only improvement I would have liked to see is more of her character arc being in conflict with her Vulcan upbringing, particularly in trying to deal with those infuriatingly irrational humans, and her emotional entanglement with Trip.



  • Electron app

    Shame. I do my best to avoid the resource bloat of electron apps whenever possible.

    I mean, when my own iron - dual 12-core 24-thread Xeon E5, 128Gb RAM - sees non-trivial impacts from just two or three Electron apps, I do my best to nip that in the bud by avoiding all that crap.

    What’s so hard about building a traditional app? With DotNet you could build a single program for all three platforms, and you could bundle DotNet up into that app such that it doesn’t even need a separately-installed sandbox like Java does.




  • Fail2ban bans after 1 attempt for a year.

    Fail2ban yes; one year, however, is IMO a bit excessive.

    Most ISP IP assignments do tend to linger - even with DHCP the same IP will be re-assigned to the same gateway router for quite a number of sequential times - but most IPs do eventually change within a few months. I personally use 3 months as a happy medium for any blacklist I run. Most dynamic IPs don’t last this long, almost all attackers will rotate through IPs pretty quickly anyhow, and if you run a public service (website, etc.), blocking for an entire year may inadvertently catch legitimate visitors.

    Plus, you also have to consider the load such a large blocklist will have on your system, if most entries no longer represent legitimate threat actors, you’ll only bog down your system by keeping them in there.

    Fail2ban can be configured to allow initial issues to cycle back out quicker, while blocking known repeat offenders for a much longer time period. This is useful in keeping block lists shorter and less resource-intensive to parse.