user224

joined 2 years ago
[–] user224@lemmy.sdf.org 9 points 14 hours ago (1 children)

Other than these just being addictive, as they are meant to be, there can be another contributing factor - lack of continuous block of free time.

I am going to make a terrible analogy as usual.
Day, week, month, etc. are like a HDD.
In those, time for work, kids, cleaning, cooking, etc. is like data.
If you've got just the work, you can fit in other normal activities like reading, watching movies, going out, etc.
With more tasks throughout the day, you might still technically have enough free time, but fragmented, and that's quite an issue. Watching a movie is best done in one go. Perhaps you can split it up to 2 halves if needed. But with many tasks, you might end up with just 10/20/30 minute breaks at a time, and then it's not worth it to even start anything.
But short form media? You might have like 20 seconds per video. That will absolutely fit into any break.
And so that's the only thing they might end up doing.

[–] user224@lemmy.sdf.org 13 points 1 day ago* (last edited 1 day ago) (1 children)

Uuuuh...
To be fair, I am dumb.

[–] user224@lemmy.sdf.org 6 points 1 day ago (4 children)

Huh, that's possible, thanks.

[–] user224@lemmy.sdf.org 8 points 1 day ago (1 children)

It's not stomach acid. Hell, you can sort of use spit as lube, I am sure it's fine.

[–] user224@lemmy.sdf.org 6 points 1 day ago (6 children)

Because it's "no stupid questions".

[–] user224@lemmy.sdf.org 27 points 1 day ago (1 children)

Unfortunately I do. No way I can make enough money to live alone during college. Hell, I am extremely slow at everything, I feel like I need at least 30 hours a day and 10 days a week to do what I need to.

[–] user224@lemmy.sdf.org 7 points 1 day ago

And then the same people go watch videos of "oddly satisfying" organized things.

[–] user224@lemmy.sdf.org 8 points 1 day ago

Skill issue, nauč sa Slovensky a budeš rozumieť aj tomuto.

[–] user224@lemmy.sdf.org 1 points 2 days ago

I think at least some of it could be intentional. Especially if victim information isn't leaked (because why would you do that).

[–] user224@lemmy.sdf.org 15 points 2 days ago (1 children)

"half your age"

???

[–] user224@lemmy.sdf.org 2 points 2 days ago

Why? Isn't there just victim info? That one should be removed if not explicitly allowed by the victim.

 

According to the prosecution, Glukhikh searched for pictures of Azov insignia on Google while he was on the bus on the morning of 24 September, though how the security forces had been made aware of the search was not disclosed.

The case materials include an image of Glukhikh’s phone lying on the table, clearly displaying the search query he is accused of making.

Bruh...

 
 

Top image source: https://www.reddit.com/r/homelab/comments/9ol79n/are_we_doing_blurry_server_cats_now/

Seen on Cisco Catalyst 3560G during pirated software update (just for playing around, not production use).
The checksums were verified against Cisco download center.

 
 

Sorry for the Imgur link, catbox wasn't loading as image, just as a link again: https://files.catbox.moe/j3a7cl.PNG

 

Approximately EUR 8 including shipping. Still sealed (probably - if not re-sealed).
There's definitely some more stuff in the box like a manual and driver disc that I can hear moving around. After all, the boxes are fairly large compared to what you'd get today.

I'd want to unpack them... but I also don't because they survived so long. I don't know. Maybe if I'll get yet another one...

Here's a look at the entire box:

Specs:
Bluetooth 1.2 Class 1
USB 1.1

Minimum requirements:
300MHz CPU
128MB RAM
Windows 98SE

So what about the Class 1?
Typically the devices you use are Class 2 with Tx power of up to 2.5mW and range of around 10m.
Class 1 can go up to 100mW with range of around 100m. Assuming both ends are same class. Otherwise you're just causing more interference on 2.4GHz.
https://www.sharetechnote.com/html/Bluetooth_Specification.html#Bluetooth_Classes_and_Ranges

It also has an external antenna giving it some cool factor.

 

Bought online for EUR 22.

At first I got worried because it was just clicking. I thought I got one with the click of death, But after some 15 minutes of several retries, it got quieter and eventually started loading disks.

Curiosity killed the cat. I was curious to see what's on them:

The ones on left had no files, the 2 on right did. Mostly the F disk. The top one had some program called powerdvd 4.

On the F one, photorec found some TTF files (fonts), exe files, 4 second videos of motorcycle speeding up and fireworks, CompCore Multimedia inc. SoftPeg bitmap banner, and some random TXT files with variables and program descriptions.

Stored undeleted were game saves of following games: Etherlords, Gorasul, Hooligans, Operation Flashpoint (incl. exe), Renegade, Sacrifice, Serious Sam - The second encounter

There were also some spreadsheets with lists of games, and of course RAR archive with colection of generic porn.

The only interesting file is spreadsheet with list of compenents for a "new computer". Most files were dates around 2002.
Case - Miditower ATX
MOBO - Microstar MS KT266 Pro2 RU VIA PRO266A
CPU - AMD Athlon XP 1900+ Socket A
Cooler - Evercool MT2 Platinum Socket A DMI
RAM - DDR PC333 CL2.5 Kingmax 256MB
FDD - Alps 3.5" 1.44MB
HDD - Seagate ST340016A, Barracuda IV, 2MB (buffer), 7200rpm
GPU - Microstar MS8853 G3 Titan 500 Pro, 64MB TVout
Network - Ovislink

 

Source: https://meow.social/@yellowdog/115132494291526535

I lied, there's no Netflix.
Instead I have a local Jellyfin server with twenty terabytes of pirated media.

115
G GG (files.catbox.moe)
 

Found being sold online.

 
 

Right, so Racknerd doesn't offer Arch image:

As for custom ISO installers, that requires opening a ticket with tech support, giving them a link to the ISO, and asking them to mount it.
Well, I am not doing all that.

So, there's also this outdated (will become important later) "rescue environment":

Linux Kernel 4.x is Debian 9 and 3.x is Debian 8. I don't know why they couldn't just say that.

So, the recovery environment has some RAM (but seems to be less than the VPS), and some storage (around 1GiB). The free storage is around 350MiB.
The recovery environment can be accessed over SSH. OpenSSH 1:6.7p1-5+deb8u4, on that older thing, if someone is curious. Modern OpenSSH client just complains about old key exchange (quantum-resistance), but connects.

Welp, Arch Linux bootstrap is 138MiB compressed, so let's go.
But not so quickly.
There's no wget, nor curl. So let's install them.
Well, apt no longer works. Old minimal environment without package installer. Cool.
I found some trick for HTTP on stackexchange using telnet. No telnet.
No lynx either.
So I downloaded it onto my PC. I first got the idea of unpacking it directly from different server, but yeah, right, no sshfs. That would have been useful for directly dd-ing images.
So I try to use rsync. Of course there's no rsync. scp saves the day.
Let's unpack the bootstrap now, shall we? We shall not, there's no zstd to decompress the archive.
The bootstrap won't fit uncompressed, and anyway, I am uploading over mobile data.
LET'S FUCKING GO! Gzip is installed.
I created a temporary 1.5GiB partition for the bootstrap, this later becomes swap space. And then I can more or less follow installation with Arch Wiki. There's also this wiki page, but it's mostly just regular Arch Install.


That's a very healthy memory usage. RAM nearly full when something else is running, swap typically above half. But their RAID-10 SSD setup seems to be doing well for that.
Speedtest, or really anything is mostly limited by that single virtual core.
I don't know what their shutdown, reboot, change root password, and reconfigure networking would do or screw up in this case. I haven't tried them yet.
The VNC cuts out with Cloudflare captcha every so often, by the way.

 

Cyber criminals purchase advertisements that appear within internet search results using a domain that is similar to an actual business or service. When a user searches for that business or service, these advertisements appear at the very top of search results with minimum distinction between an advertisement and an actual search result. These advertisements link to a webpage that looks identical to the impersonated business’s official webpage.

In tips section:

Use an ad blocking extension when performing internet searches. Most internet browsers allow a user to add extensions, including extensions that block advertisements. These ad blockers can be turned on and off within a browser to permit advertisements on certain websites while blocking advertisements on others.

view more: next ›