

Can you explain how this works? My seeding is garbage and I’m not sure how to set it up to work better.
Can you explain how this works? My seeding is garbage and I’m not sure how to set it up to work better.
Seeding is crippled due to no port forwarding. You can download, you just can’t really share back.
Powered off it uses almost twice the energy of my server.
That’s insane.
People like playing Nintendo original games. Mario games, Zelda games, etc.
The only way to legally play those is on the switch.
Yes, even non children play those games.
https://en.m.wikipedia.org/wiki/Chernobyl_(miniseries)
It was released on DVD and Blu-ray, if he purchased the disc and ripped it to his media, and hasn’t shared those files with anyone, then it is legal, as an exception to copyright in the US, where Jeff and Google are both based.
Jeff has stated on multiple occasions that he purchases and rips his media, and does not use piracy.
I’m curious if this actually ends up being significantly lighter though.
I doubt it’ll end up replacing a conventional two stroke motorcycle, as it’s far more complex. But I could see it used in aircraft.
You have to get the file from Amazon first in a format that deDRM works on. That’s the trouble here.
Kindle for PC still works, but you have to find an old version and disable updates.
I have Plex running alongside Jellyfin.
When transcoding video, Plex uses an extra 5 watts of power. Jellyfin uses an extra 55 watts.
Jellyfin also has security holes for accessing videos via URL without being authenticated.
I don’t feel like Jellyfin is ready for being exposed to the internet.
It’s off by default, but it allows you to turn it on in the advanced settings. Seems like a good compromise, especially since it lets you whitelist clients.
If you were using the router as a secondary network, like for IoT or homelab, it would kind of make sense to allow SSH or other logins from WAN, as long as the WAN was also your network and not the open internet.
Took a while to find a list of router models, I doubt this is an exclusive list, but at least bleeping computer has a list at all.
The threat monitoring firm reports that the attacks combine brute-forcing login credentials, bypassing authentication, and exploiting older vulnerabilities to compromise ASUS routers, including the RT-AC3100, RT-AC3200, and RT-AX55 models.
Kinda tricky to tell what exactly I’m supposed to check.
I run an ASUS RT-AX86S
To check if the settings have been compromised:
Log into the router under http://192.168.1.1/
Advanced Settings/Administration
System tab
Service section
Enable SSH should be set to OFF
I had a 212j for about 10 years before I got a 720+.
The j series are so underpowered the dashboard took literal minutes to load.
The + series is extremely energy efficient, but still powerful. I was running a Plex server along with a Terraria server on it and had no hiccups.
Now they were designed nearly a decade apart, but still. The + series is the way to go, don’t get anything else if you go with Synology.
Oh damn, I had no idea that’s why a lot of movies had OCR issues with my subtitles. I knew the information, and I had this problem, but I never put it together to realize that it had to be OCRd.
Piracy has none of these problems.
Once again, playing by the rules is a worse experience.
There’s no such thing as too simple to document. If you spent time learning how to install it, you’ll need to relearn it if you want to make any changes in the future. If you don’t leave at least some notes as to why you make some decisions, you’ll have to redo your work.
It’s also good to make notes on every configuration setting. That forces you to understand why the settings are the way they are. If you have a -f in a docker config and you don’t have any understanding of why that’s there, you might not know if it’s a development flag for getting things set up, or if it’s a critical part of your environment.
It is especially important if any of those parts are exposed to the public Internet. You might have a config set to allow unauthenticated connections and not know it.
That only works after the video is out and has usage statistics.
This could theoretically start to identify those moments before the video is public.
That’s how I read the article, yes.
It’s a little confusing, because they seem to also be speculating on how power generation and load will be in the future as well as people’s charging habits.
I’m not sure you’re talking about the same thing the paper is about. The overall load is lower, but the mix of power types is different.
Specifically, in California, there’s a HUGE difference in power generation types overnight than during the day. There’s excess capacity until the sun goes down due to solar. If you look ahead to everyone driving EVs, and then assume that everyone charges at night, then the power problem is completely different than what it is today.
You’re missing that the researchers recommend charging during daytime business hours, which means people who use EVs to drive to work would need public or workplace provided chargers to accommodate this.
Setting a timer to charge around noon wouldn’t help if you’re parked at your job with no chargers nearby.
I use qbittorrent, and even popular or legitimate torrents get zero uploads.