Devices should never accidentally bend. Unless you drove over it with a car, chances are it wasn’t your fault.
I blow hot air.
Devices should never accidentally bend. Unless you drove over it with a car, chances are it wasn’t your fault.
Ah, that makes sense. I was thinking more like a mini-m&m tube.
I’m having a hard time envisioning the flexibility required to make that work. It couldn’t have been both at the ends at the same time? Also, did this kid just get naked in front of everyone at their party? To each their own, I guess.
If you want a decentralized search, set up a DHT crawler and build a db of millions of torrents in a week or two. If you want anonymity/legal protection, use a trusted VPN. I’m not sure I’d trust a random independent tor-like implementation, especially when the real tor is slow and has imperfect anonymity.
If you’re worried about unauthorized access to the physical machine, you could always just do disk-level encryption instead or store the app’s data in something like a Veracrypt virtual disk. They’d still be able to access the data if they go through your OS/user, but wouldn’t pick anything up by accessing the drive directly.
Nothing short of E2EE can truly stop someone from accessing your data if they have physical access to the server, but disk encryption would require a targeted attack to break, and no host is wasting their time targeting your meme server. I seriously doubt they’d access it even if you had no encryption at all, since if they get caught doing that they’d get in a heap of legal trouble and lose a ton of business.
Plenty of comments hurt my brain trying to comprehend how utterly stupid they are, but I don’t think there’s anything an anonymous stranger could say that would hurt my feelings, that kinda stuff needs to be personal.
Who even uses the web editor on any git website though? For anything besides micro fixes for projects I don’t already have cloned, I find it easier to just update things locally and push.
Don’t even get me started on github rendering tabs as EIGHT spaces.
All these answers read like they’re written for comp sci students rather than a general audience. Let me give an ELI5 (more like ELI12) a shot.
Ports are just numbers. They aren’t physical pathways or doors or windows or anything like that. A better analogy is a street address, like an apartment number. Your IP address identifies your computer (apartment building), and the port identifies the program on the computer (the apartment). When a program needs to talk to the internet, which is very similar to sending a letter, it hands a packet/letter to your computer and your computer assigns the program a port number. It then puts that number on the return address of the letter so that the recipient knows where to send the response. The computer remembers that port number is associated with that program, so when it gets an incoming letter with that number, it gives it to the program. After the program is done talking to the internet, the computer frees the port up to be used by another program.
Ports are “closed” when there is no program associated with them. Any incoming letters are ignored because they have nowhere to go.
Ports are “open” when they’re associated with a program. This happens automatically when programs send outgoing letters, or you can manually open (or “forward”) ports by telling your computer/router what the port should be associated with and that it shouldn’t use the port for something else.
ELI5 over.
The internet is networks on top of networks on top of networks, so your computer will have an IP and assign a port number, then your router will remember that and change the address on the letter to its own IP with a different port number, then that process repeats a few more times until eventually it reaches its destination. You don’t have to deal much with your computer’s internal network, but occasionally you have to deal with your router’s by opening/forwarding a port because it has a NAT that has to deal with all of the devices on your network. Forwarding the port just tells your router to always send incoming letters with that port number to a specific device.
Could be worse, mine have started saying “the MVP must be feature complete and 100% bug free” but there’s a 0% chance there’s enough budget for that.
That’s crappy, but have you seen what other remote apps are doing?
Vizio has an ad that takes up around 25% of the screen!
MyQ has a large scrolling ad at the top, and they are actively hostile towards any integration that allows you to control your garage door without using their app (unless you use one of the very few subscription-based integrations they offer, of course).
The Mac Pro only costs three times as much as a cheese grater???
I’ve never tried, that might work? Connecting via bluetooth works. You can even use the tv remote!
I own and like the steam link, but the reason they don’t sell it anymore is because the steam link app is on most smart devices now, and if your TV doesn’t support it, you can buy a streaming stick that does for like $30, give or take depending on sales. And those devices are more portable (less wires) and more versatile than a steam link.
Any competitive price for the steam link would be less than what Valve can produce them for. Weren’t they selling it for $5 at the end? Pretty sure I picked mine up for $10 or less. Steam can’t show ads to subsidize the price of the hardware like every other smart device does.
What software isn’t?
Google is disallowing “remote code” in extensions and classifying blocklists (the lists of urls that ad blockers use to know what to block, which are just text files hosted on remote servers like github) as remote code. As a result, any blocklist updates will need to go through the extension review process, which typically takes anywhere from a few hours to a few weeks.
Google often updates YouTube’s ad delivery on a daily basis. Blocklists must also update as frequently to keep ads blocked on YT. If Google requires that blocklists go through the review process, they can drag their feet and essentially render the ad blockers useless even if they have to allow them to stay in the extension store.
Not sure what scenarios are exceptions to that. Like, you wouldn’t want to get locked out of an account just because you said STOP to your 2fa codes.
I set up automated texts a while ago and IIRC they must comply with the keywords STOP and HELP, otherwise they can get in big trouble with the carriers.
Yep, that protection plan is $1.49. The real sin here is having the “Original Price” not be an obvious order total, but that’s pretty minor.