Comments

This profile is from a federated server and may be incomplete. Browse more on the original instance.

PM_Your_Nudes_Please, to lemmyshitpost in Analog problems require kickass solutions

No more than a standard connection. Every cable inherently acts as an antenna, so that’s why we try to avoid running them parallel to power lines and other things that would give off audible interference. If you actually want to reject interference, you’d need a balanced signal. Regular RCA and 1/4” are both unbalanced, so they’ll both pick up interference regardless of how they’re tied together.

When dealing with unbalanced cable, the most important part is making sure your signal to noise ratio is good. If you can get a hot enough signal that your gain can be lowered, you may be able to reduce the interference completely below your noise floor. Of course there are arguments against this (like how running things that hot could potentially mean you’re clipping your outputs, which introduces a whole host of other issues) but as a general rule, you want your gain to be as low as possible, so you can reduce the amount of background interference and noise you’re picking up.

PM_Your_Nudes_Please, to lemmyshitpost in Analog problems require kickass solutions

You don’t always have the luxury of time though. I work in entertainment, and I’ve definitely scrapped adapters together in a pinch. When you have a show starting in 15 minutes and a musician rolls up with some bespoke gear with weird connections, your only real choice is to bodge something together and make it work.

Nothing quite like seeing five adapters chained together, to go from stereo RCA to TRS 1/8” to TRS 1/4” to dual TS 1/4”, to XLR… All because you didn’t have a direct box that went straight from RCA to XLR, because another musician walked off with it after their show wrapped up at 2AM last night.

PM_Your_Nudes_Please, to linux in Windows 11 scores dead last in gaming performance tests against 3 Linux gaming distros

That’s largely a corporate decision that is out of the hands of the programmers. Generally speaking, security specialists would agree with you. But running anticheat on the server costs server resources, which means you need more servers to accommodate the same number of players. Running it client-side is a cost cutting measure mandated by the corporate bean counters who did the math and concluded it’d be cheaper for the company to spend the users’ computer resources instead.

While I agree that client-side security isn’t the best solution, it’s certainly better than no solution. It’s the same argument people have against self-driving cars. The self-driving cars don’t need to be perfect; They just need to be better than the average driver. If they can reduce the number and severity of accidents that are currently happening without them, then they should be implemented. Even if the solution isn’t perfect. Because an imperfect solution is better than doing nothing at all.

PM_Your_Nudes_Please, to linux in Windows 11 scores dead last in gaming performance tests against 3 Linux gaming distros

And that definition depends on how you define “benefitting the user”. If someone has an online match ruined by a hacker, I’d argue that they would have benefitted from the game running some kind of anticheat.

Do we define user as the singular individual person? Or do we consider the user as a collective, and factor in the larger benefit to the masses? It could even be argued that the people running cheats are the ones running malware (specifically, malware that targets the other users in the match) and should therefore be treated the same way we treat people who use more traditional viruses and trojans at the detriment to others. The same way you wouldn’t want some virus-ridden machine connecting to your home network, (you’d probably want everyone to at least be running a basic virus scanner and have common sense when browsing,) you would want everyone in the game running anticheat to ensure there is no malware.

Very few people would say that it’s okay to waste others’ time and computer resources on a bitcoin miner trojan… Most people would (correctly) determine that it is theft. But then when it comes to online games, the same people feel entitled to waste other peoples’ time and computer resources by ruining their matches.

PM_Your_Nudes_Please, (edited ) to memes in America: Getting ready for another election. Rest of the world:

It doesn’t help that the “both sides are bad” argument is commonly used by right wing trolls. Lots of liberals have the immediate reaction to get defensive because they’ve seen how quickly the “ugh this specific thing I don’t like sucks” argument devolves into “nothing has changed with Joe so it doesn’t make a difference,” which leads into “might as well not vote at all, or vote red because it doesn’t make a difference.”

PM_Your_Nudes_Please, to piracy in India blocks GitHub, after lobbying done by copyright trolls

Okay boomer

PM_Your_Nudes_Please, to historyporn in Window baby cage, UK, 1937

“Hey boss, we’re having some supply side issues. Looks like Chads R Us has a workers strike for No Nut November. They’re refusing to deliver any product until at least December.”
“Ugh, I guess we can use our fallback vendor. Give Incel Inc. a call. I hate working with them cuz we have to double-check all of their work. But it’ll at least keep things running. Tell our folks that we’re authorizing overtime during the holiday season, so we can have enough women to run QA on Incel’s work.”

PM_Your_Nudes_Please, to piracy in Advice on blocking Youtube ads.

Yup. Blocking ads with a pihole would also block the videos. Which kind of defeats the purpose.

PM_Your_Nudes_Please, to piracy in Recent Research Papers Piracy

The issue is visibility. Just like self-publishing a book, you’re in an uphill battle to even get your work seen. If you ever want to be cited by future publications, your research needs to be easy for future researchers to find and access. And traditionally, that has been done by consolidating studies via scientific journals.

Sure, you could try to start your own FOSS version of a journal. But that will require web developers, hosting costs, and the enthusiastic support from (and adoption by) other researchers. Because if nobody uses your system, it’s worthless for it’s intended purpose.

PM_Your_Nudes_Please, to piracy in Keygens/Patches/Cracks

You’ve got a few questions here, so let me break it down…

What is a crack?

A crack is simply a way of defeating DRM. In the old days, games would often require the game disc to be inserted before they would boot. It was a very easy way of preventing people from simply sharing the files. Because even though the game was installed and didn’t need the disc, the game would simply refuse to launch without the CD in the tray. It was a sort of physical DRM, because disc burners weren’t super common yet so copying a game disc wasn’t super easy.

So the crack simply edited the part of the game that checked for a CD. Sometimes it was as simple as removing the few lines of code that told the game to check for a CD. Sometimes it was simply a matter of telling the game that the disc was always inserted. But that’s just an early example of a crack; It was modifying a game file (or files) in some way, to make them boot even when DRM would normally prevent it.

Modern cracks are much more complicated, but the end goal is the same. Crackers are simply trying to defeat the DRM, so the program will boot. It usually modifies a few files, to get the program to boot when it normally wouldn’t. The cracks are usually fairly small in size, because the actual program .exe and a few .dll files are usually all that gets changed. So patching the program is usually as easy as moving the cracked files into the respective folder, and overwriting the legitimate files.

Why does a crack show up as a virus?

Lots of modern cracks need to do some pretty fucky things to defeat modern DRM. It often requires intercepting network traffic that the launcher would use to “phone home” to a company server. For instance, maybe the launcher checks in with a company server to verify that your program is legit. If the server responds that it is, then the program boots. So the crack would potentially need to intercept that network traffic, then spoof a response from the server. But you know what else does something like that? A virus, attempting to hide itself.

And modern antivirus softwares don’t rely on “hard” virus definitions to identify viruses. The traditional way of scanning for viruses was to just keep a massive database of known threats, then compare files against that. But that’s slow and new threats constantly need to be added in order to keep your virus scans accurate. And if a hacker is able to change their virus slightly, you’ll need to add a whole new item to the database just to target the change.

So instead, they use something called heuristics, which basically means they look at how a program operates, then guess whether or not it’s actually a virus. It uses common virus behaviors and pattern recognition to try to identify a virus. This increases the chances of a false positive, but means scans are much quicker and will catch new threats in the wild even when they haven’t been officially documented yet. But since different companies use different virus definitions for their heuristics, different antivirus programs will give false positives to different cracks.

If it’s only a few flags on VirusTotal, you’re likely going to be fine. It’s most likely a false positive from those antivirus programs.

PM_Your_Nudes_Please, (edited ) to piracy in Recent Research Papers Piracy

Yup. Researchers will gladly send you the study for free, because they don’t make anything when you pay for it through a journal. For the unaware, the fee charged by research journals goes completely to the journal; The author/researchers don’t get anything for it. In fact, they have to pay the journal to get published. And that shit isn’t cheap! The more prestigious journals can charge upwards of $8-10k.

The research journal scheme is a giant scam, designed to double-dip and extract profit from both ends. And it only works because scientific communities tend to look at certain journals as prestigious. So they want to be published in those journals, even if they have to pay. But I can almost guarantee that the researchers resent the journals, because they’ve been roped into paying for research for their entire professional lives. And that’s why they’re usually happy to send you a free copy of their paper if you just email and ask nicely.

Journals are also bad because they frequently privatize research that public funds paid for. For instance, let’s say the government pays for a study to be done. Then the researchers need to get that published, so they pay the journal to publish it. Then the journal paywalls the study, even though it was already paid for with tax dollars. It’s shit that sounds like it should be illegal, but is commonly accepted for some reason.

PM_Your_Nudes_Please, to piracy in Help me trash my FireTV stick

I personally prefer Plex (I got the lifetime PlexPass before Jellyfin was even a thing) but I agree with this 100%. Set it up on a spare computer (or even a RPi,) and toss it in a closet. Then you can use the *arr suite to automatically download new titles.

FileBot will help you automatically rename downloaded files for easy media detection; Historically, the big complaint with Plex/Jellyfin has been the files need to be named very specifically. But FileBot takes care of that, and even downloads subtitles and posters/box art/etc automatically (though with OpenSubtitles API change, that may not be the case anymore?)

PM_Your_Nudes_Please, to linuxmemes in They’re in no position to complain

Reject modernity; Return to MS-DOS

PM_Your_Nudes_Please, to linuxmemes in They’re in no position to complain

Yup. I work in media, and there are a lot of media programs that are Mac exclusive. Even worse, Apple insists on breaking lots of them with every update. So at work, we always have to decline updates for a week or two until all of our programs have a chance to update and unfuck everything Apple did.

The worst case was when Apple came out with the M1 Mac’s. One of our programs took almost a year and a half to finally get updated to work on M1 processors. And of course, this was right around the time that we were looking into upgrading our Macs, because our existing ones were starting to show their age. So we just had to sit on our hands (and put the funding towards something else) until the mission-critical programs we needed all got their proper updates.

PM_Your_Nudes_Please, to piracy in Favourite FOSS Torrenting Client for Linux that has a VPN killswitch?

As others have said, just use qBit. It’s feature-rich and supports network interface binding. Simply bind it to your VPN’s interface, and it’ll only use your VPN. If your VPN connection drops/isn’t turned on, qBit simply won’t be able to connect.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #