I wish people would stop comparing those uses of copyright to nonprofits like Internet Archive
While I understand AI training exemptions to copyright are controversial, and think most people here would side with IA on ebook lending.
I wish people would stop comparing those uses of copyright to nonprofits like Internet Archive
While I understand AI training exemptions to copyright are controversial, and think most people here would side with IA on ebook lending.
I don’t think the concern is cats killing other animals, I think it’s purchasing animal based products for the cat
It depends on the attack vector. Typically you’re right, but malicious .lnk files are often paired with other malicious methods to infect machines. Sometimes they’re configured as a worm that copies and spreads when a flash drive is connected, sometimes they’re configured to download a remote payload when another script or program is started. The problem is that it’s a type of file that’s often overlooked because it seems innocent.
It isn’t necessarily the case that the Trojan needs to be interacted with by the user in order to execute the malicious code. Just having the file on your machine opens the door for all kinds of attacks (especially if you’re using a headless setup: you wouldn’t necessarily know you have the .lnk file in the system unless you’re manually unpacking your downloads yourself). All it needs is for another piece of infected code to run and look for that file, and it can open the door for more traditional malicious code.
Edit: just as a for-instance - If I was a black hat and wanted to spread some malicious code, I could include this .lnk file in a torrent (innocuous enough to slip by unnoticed by most people/unscrupulous pirates), and then maybe place a line of code in a jellyfin plugin or script that looks for that file and executes it if it’s found. Because the attack isn’t buried in the plugin or script itself (most people wouldn’t think much of a line of code that’s simply pointing to temp file already on your system), it could theoretically go unnoticed for long enough to catch a few hundred or thousand machines.
I believe the torrent included both an .mkv and a malicious .lnk file.
.lnk files are dangerous because they can evade detection and automatically open other files or executable on a computer; AFAIK you would not have had to open the .lnk file yourself.
“I have a girlfriend but she lives in Canada and doesn’t have any socials”
Lots of good suggestions here
I’m a bit surprised by your budget. For something just running plex and next cloud, you shouldn’t need a 6 or even 3k system. I run my server on found parts, adding up to just $600-$700 dollars including (used) SAS drives. It runs probably a dozen docker containers, a dns server, and homeassistant. I don’t even remember what cpu I have because it was such a small consideration when I was finding parts.
I’d recommend keeping g your synology as a simple Nas (maybe next cloud too, depending on how you’re using it) and then get a second box with whatever you need for plex. Unless you’re transcoding multiple 4k videos at once, your cpu/GPU really don’t need much power. I don’t even have a dedicated GPU in mine, but I’m basically unable to do live 4k transcodes (this is fine for me)
If i’m understanding the last graph right, it’s showing the total number of active monthly users per instance’s top communities, filtered by the overall top 100 communities?
So if an instance has activity spread out over many niche communities, that activity isn’t represented on this graph?
I would think having a diversity of smaller communities is more in-line with the spirit of the fediverse, I’m not sure of the value in slicing the data in this way.
Oh is it time for another defed campaign already?
I used to think the same thing, but I did an effort post about this about a year ago (here’s the link)
The article you linked to says something similar to my own understanding: basically, DRM circumvention for personal use is officially not allowed under DMCA and could absolutely be used against you in court, though the likelihood is low. The exceptions the author mentions are pretty nebulous, and the Library of Congress actually addresses the most common cases in their discussions and publication and affirms that they are not allowed.
I don’t personally agree with their interpretation, but I think more people ought to know that it’s officially not legal to circumvent DRM for personal use.
If Amazon started charging for smart-home solutions, they’d essentially be making the case for FOSS solutions like home assistant.
Granted, there will always be a contingent of people who are unwilling to learn how to self-manage that tech, but there are certainly enough people who are willing that they should think twice about heading down that path.
I think everyone ought to strip their media of drm, but you should know that personal use does not qualify as fair use under US law
Yup, I ended up frankensteining a nas from various craigslist parts (i actually found a low-power business-class server motherboard that has worked out well for the purpose). Had to get a SAS HBA card and a couple SFF-8087 cables to do the job right, and I grabbed an old gaming case from the 2010’s to hold it all, but it was relatively seamless. I had one of the drives go out already, but luckily I had it in a raid configuration with parity so it was just a matter of swapping out the drives and rebuilding.
It’s been fun and rewarding, for sure! I’m glad I didn’t sell them like these other dweebs told me to lol
I’m biased but I think everyone should do this. You can basically find the hardware you’d need out of a dumpster, and then you can slowly build your library from there.
If you find torrenting to be distasteful, you can get a cheap USB DVD reader and rip dvds instead.
It’s still technically considered infringement, but at least it’s completely private.
I honestly don’t know why you wouldn’t just do jellyfin, unless you’re limited by your hardware and kodi somehow has less overhead?
They’re both free I guess. You can try them on and see how well they serve tour use case
Guess ill be trying my hand at building my own pfsense router
Yea, I don’t think the se runs it out of the box but I’ve heard an rpi can be used
I got the se a couple months ago, unfortunately it doesn’t use klipper without modding it with a rpi as far as I know
Yup, I was only pointing out that i was having trouble doing the same thing in my docker compose (using the webui_port env variable did not avoid port collisions at deployment)
I haven’t tried this particular compose outline though. It could also be the pirate_network they’re initiating or the depends_on variables they’re using, I just haven’t played around with it yet.
I use this for architecture and it’s saved me so much time