• 0 Posts
  • 495 Comments
Joined 1 year ago
cake
Cake day: June 8th, 2023

help-circle

  • If you want to run a service in a container for security purposes and it doesn’t need to use the gpu, you can just use any container management software to run it.

    Then your “whole pc” is the private part that only you have access to and the stuff in the container is the “public” part.

    If the service needs to use the gpu then it might be worthwhile to run it in a vm with gpu passthrough.

    No matter what though, you need to say what you’re trying to do. Like exactly what you’re trying to do. Like what specific software packages you’re trying to run and how you want the “anonymous” and “public” sections to be different.

    It almost sounds like you wanna run a stable diffusion setup with two different model sets so an authenticated user can make pictures of Donald trumps head on Christina Hendricks body but public users can only do normal generic stuff.




  • you really might not.

    before there were mobile phones there was analog dtmf wired telephones. they replaced pulse dialing and allowed for all kinds of additional signalling and triggering. ring a bell, operate a relay, kick people off so you could call the president, entire automated analog switching centers, you name it.

    when mobile networks came on the scene there were all sorts of additional triggers but because the (second gen? the ones that could do sms) signals were actually digital, there was a much wider array of possibilities. dtmf had a handful of frequencies it supported and if you wanted to do something more you had to basically make sure the entire network you were using could send, transport and receive those frequencies.

    now imagine instead of sixteen combinations of frequencies played at the same time you have access to thousands of possible triggers. once you have simple stuff like the basic receiving of text and lighting a led or playing one of several legally distinct jingles covered, you could do do much more. and people did. there were all kinds of things pagers could do through combinations of local interface and digital communication with a cell tower, all mediated through a handful of baseband chips on the pager pcb that could have the pins for stuff they wouldn’t be used for disconnected.

    but how would you make a pager set off an explosive?

    well, the same way you use a casio f91w wristwatch to. you use its built in functionality (the speaker when the alarm goes off) to trigger a battery that can deliver enough electricity into a resistor to heat it up enough to make your (primary) explosive detonate.

    in the case of a pager, those baseband chips have all kinds of on and off switching built in. it’s not hard to imagine that basic, out of the box functionality would include pulling a pin high when it gets “*97” or some such. now tie that pin to the base of a transistor across the positive and negative terminals of the battery and sitting against a little petn and you got yourself a remotely triggered explosive.

    you wouldn’t even need a pcb.

    there’s probably a lot of stuff thats incorrect in this reply. it’s late and this is off the dome.


  • Some more things I’ve used old netbooks for:

    Portable pxe boot server

    Audio source for mixing (think using a mixing board to do audio collage work with tape, record and digital sources)

    Midi sequencer- the cheap usb to midi breakout cable works good here and you really don’t need much horsepower to sequence midi.

    Tracker playback and editing

    Display driver/art/digital photo collage/digital signage/whatever.

    E: People will tell you that you’re better off with a sbc because it’ll save you money on power. Do your own research on this. A kill-a-watt is cheap and the power savings quickly gets murky.



  • There’s lots of uses for it.

    An overlay network like nebula uses “lighthouse” nodes as ways to reverse proxy to all the other hosts in the overlay. I’ve used og eeepcs as nebula lighthouses before.

    “Dumb” 3d printers honestly don’t need much to bring their feature set in line with expensive ones. I still use an old netbook to control two. The screen and keyboard are great when I want to check files. Slicers and whatnot can easily run in low resource settings on those computers.

    Vents allowing (and many netbooks do!), you can slide the computer into a shelf and use ssh to perform tasks on it. There’s a bunch of stuff that an always on computer with a built in battery backup can be used for at times, especially if it’s on a wired connection and you can use the wireless interface.

    People will say you should be afraid of the batteries exploding or venting. I’m honestly not too concerned, but be sure to check them maybe once or twice a year.










  • bloodfart@lemmy.mltoLinux@lemmy.mlWhich distro?
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    4 days ago

    So you have a lot of suggestions in this thread.

    I have an unconventional one:

    Red hat.

    You can use it for free as long as you register on their website.

    The benefit: lots of documentation, a significantly different way of thinking about things (it asks you to define a compliance posture out of the box lol) and a package manager that does a lot of things right.

    You said yourself youve been in the game for a while. Why not try being agent smith instead of neo?



  • The data is stored in little ccd cells. It’s recorded as an analog voltage. There is no difference between analog voltages and digital voltages, I’m just using the word analog to establish that the potential is a domain that can vary continuously.

    When you read the data, the levels of the voltages are checked and translated to the digital information they represent.

    To determine the level of a voltage, a small amount of current is allowed to flow between the two points being measured. It’s a very small amount. Microamps and less.

    When you draw current from a charge carrying device the charge, as represented by the potential between its negative and positive terminals, the voltage, decreases.

    When the controller in the ssd responsible for reading voltages and assembling them into porno.mov doesn’t get a clear read, it asks again. As the ssd ages, parts of it can be re queried hundreds of times just to get commonly read information into memory like system files.

    So the ssd degrades on read, and the user experiences this as “slowness”.

    Would rewriting the data fix this problem? Yes. Using either badblocks -n, dd or a program called spinrite, rewriting the data fixes that problem.

    Why doesn’t the ssd just do it? Because the ssd only has so many write cycles before its toast. Better to rely on the user or more accurately the host os to dictate those writes than to take on that responsibility.