cultural reviewer and dabbler in stylistic premonitions

  • 51 Posts
  • 285 Comments
Joined 3 years ago
cake
Cake day: January 17th, 2022

help-circle



  • (disclaimer: this information might be years out of date but i think it is still accurate?)

    SSH doesn’t have a null cipher, and if it did, using it still wouldn’t make an SSH tunnel as fast as a TCP connection because SSH has its own windowing mechanism which is actually what is slowing you down. Doing the cryptography at line speed should not be a problem on a modern CPU.

    Even though SSH tunnels on your LAN are probably faster than your internet connection (albeit slower than LAN TCP connections), SSH’s windowing overhead will also make for slower internet connections (vs rsync or something else over TCP) due to more latency exacerbating the problem. (Whenever the window is full, it is sitting there not transmitting anything…)

    So, to answer OP’s question:

    • if you want to rsync over SSH, you usually don’t need a daemon (or to specify --rsh=ssh as that is the default).
    • if you the reason you want to use the rsync daemon is performance, then you don’t want to use SSH. you’ll need to open a port for it.
    • besides performance, there are also some rsync features which are only available in “daemon mode”. if you want to use those, you have at least 3 options:
      • open a port for your rsync daemon, and don’t use SSH (bonus: you also get the performance benefit. downside, no encryption.)
      • setup an SSH tunnel and tell the rsync client it is connecting to a daemon on localhost
      • look at man rsync and read the section referred to by this:
        • The remote-shell transport is used whenever the source or destination path contains a single colon (:) separator after a host specification. Contacting an rsync daemon directly happens when the source or destination path contains a double colon (::) separator after a host specification, OR when an rsync:// URL is specified (see also the USING RSYNC-DAEMON FEATURES VIA A REMOTE-SHELL CONNECTION section for an exception to this latter rule).

    HTH.



  • "but why" meme, with the the text "but why" over an image of Ryan Reynolds in medical scrubs in the film Harold & Kumar Go To White Castle

    meme culture is arguably a subset of that thing called “remix culture”, but, the guy who coined that term and created Creative Commons to support it was tragicomically mistaken about the viability (not to mention actual utility) of his efforts to get participants in it to care about engaging with copyright law via copyleft licenses.

    so, i think the answer to your question is: probably not.

    “hmm, i should find an appropriately licensed image to use” is not something most practitioners of applied memeography have ever said or will ever say (at least until general-purpose computers are actually outlawed, such that casual copyright infringement becomes non-trivial). imo. 🤡


  • Arthur Besse@lemmy.mlOPMtoMemes@lemmy.mlMystery solved
    link
    fedilink
    arrow-up
    8
    ·
    11 days ago

    I don’t want to access the Sun, what’s the TLDR?

    The TLDR is that the article doesn’t explain that the reason it is circular (not to mention “invincible”) is because that is the defined boundary of a national park:

    A LONELY volcano surrounded by a dark green forest dubbed the “goblin forest” has left explorers baffled by its perfectly circular appearance.

    here is a copy+paste of firefox's reader view of the article

    thesun.co.uk Mystery of perfectly circular invincible ‘Goblin Forest’ surrounding a sacred volcano in the land of Hob… Vera Demertzis 4–6 minutes

    The lonely, almost perfect conical volcano sits in an eerily circular forest

    Published: 18:54, 19 Nov 2024
    Updated: 1:26, 20 Nov 2024
    

    A LONELY volcano surrounded by a dark green forest dubbed the “goblin forest” has left explorers baffled by its perfectly circular appearance.

    Sitting at 8,261ft tall, with a six mile radius , Mount Taranaki is the second highest peak on New Zealand’s North Island.

    Sign up for The Sun newsletter

    The perfectly circular Goblin Forest surrounds the Mount Taranaki volcano

    6 The perfectly circular Goblin Forest surrounds the Mount Taranaki volcanoCredit: NASA/Landsat 8

    The Goblin Forest is overgrown with twisted and deformed trees

    6 The Goblin Forest is overgrown with twisted and deformed treesCredit: Getty Images - Getty

    The stunning mountain featured as Mt Fuji in The Last Samurai and Mount Doom in a panoramic shot

    6 The stunning mountain featured as Mt Fuji in The Last Samurai and Mount Doom in a panoramic shotCredit: Getty

    The iconic Mount Taranaki volcano in New Zealand’s North Island is so striking, that it once doubled as Mount Doom in the “Lord of the Rings” and Mt Fuji in “The Last Samurai”.

    The lonely, almost perfect conical volcano sits in an eerily circular forest containing thousands of warped and ancient kamahi trees fighting for space.

    The trees are extremely twisted and deformed as a result of having to grow over and around the fossilised remains of trees that were destroyed in past eruptions.

    The trees are also covered in hanging mosses and liverworts, adding to its creepy appearance. Read more world news

    In 2017, the mountain attained a new level of protection when it was granted the same legal rights as a person.

    The status is an acknowledgment of the Indigenous Māori people’s relationship.

    Despite its perfectly circular appearance from above, the volcano has a history of dramatic change.

    The mountain side has collapsed and rebuilt 16 times, with each cycle sending large debris avalanches down its flanks from past eruptions since it first formed around 135,000 years ago.

    Steep slopes, loose sediments, high rainfall rates, and buried faults all contribute to its tendency to collapse.

    The iconic volcano last erupted 200 years ago, but is still considered active and occasionally spits out mudflows.

    Researchers believe that there’s a 30-50 per cent chance of another major eruption in the next 50 years, potentially effecting more than 100,000 people.

    Recently, a hiker was rescued from the clutches of the mysterious mountain.

    The hiker had called for help after he realised he was going into hypothermia.

    He had been on a day trail run when he was caught out by weather in very cold temperatures, local police said.

    A police spokesperson added: "Unprepared for the local conditions, the solo traveller was running out of food, water, and phone battery, and was 1400 metres up the mountain when he phoned for an ambulance.

    “Taranaki Police Search and Rescue, the Taranaki Rescue Helicopter and alpine cliff rescue members were scrambled in an effort to get the man off the mountain as quickly as possible.”

    Mount Taranaki isn’t the only perfectly circular mystery.

    A mysterious spinning island shaped like a perfect circle has left explorers baffled for years.

    Known as “The Eye” the uninhabited patch of overgrown vegetation floats around a crystal clear lake in Argentina slowly moving each day.

    The bizarre natural phenomenon sits in the swampy river of Parana Delta in Buenos Aires and it has left many experts stumped over why or how it moves so freely.

    Those lucky enough to have travelled to the island say it is almost a perfect circle due to the movement of the land mass.

    Overtime the corners of the lake have managed to rub against the island as it moves and eroded itself into 360 degree smooth outlines.

    Incredible aerial footage shows the 387ft spherical island, known locally as El Ojo, surrounded by a crescent of water.

    The leading reason as to why the island floats is due to a natural process that sees water currents slowly shape and rotate the island in strong currents.

    A few other shocking theories suggest it may have belonged to an ancient civilisation. READ MORE SUN STORIES

    Or a more bizarre theory that claims the incomprehensible perfection and isolated location may be linked to extraterrestrial life.

    Some say El Ojo could be a hidden UFO base but so far no evidence has backed this up.

    Hanging moss and liverwort give the trees a creepy appearance

    6 Hanging moss and liverwort give the trees a creepy appearanceCredit: Getty Images - Getty

    A hiker was recently rescued from the mountainside

    6 A hiker was recently rescued from the mountainsideCredit: Getty Images - Getty

    The active volcano occasionally spews mudflow but hasn’t erupted in more than 200 years

    6 The active volcano occasionally spews mudflow but hasn’t erupted in more than 200 yearsCredit: Getty










  • Arthur Besse@lemmy.mltoProgrammer Humor@lemmy.mlcarrot.py
    link
    fedilink
    English
    arrow-up
    56
    arrow-down
    1
    ·
    1 month ago

    only hobbyists and artisans still use the standalone carrot.py that depends on peeler.

    in enterprise environments everyone uses the pymixedveggies package (created using pip freeze of course) which helpfully vendors the latest peeled carrot along with many other things. just unpack it into a clean container and go on your way.



  • I’m not sure what this comic is trying to say but in my recent experience a single misbehaving website can still consume all available swap at which point Linux will sometimes completely lock up for many minutes before the out-of-memory killer decides what to kill - and then sometimes it still kills the desktop environment instead of the browser.

    (I do know how to use oom_adj; I’m talking about the default configuration on popular desktop distros.)




  • $ systemd-analyze calendar tomorrow
    Failed to parse calendar specification 'tomorrow': Invalid argument
    Hint: this expression is a valid timestamp. Use 'systemd-analyze timestamp "tomorrow"' instead?
    $ systemd-analyze timestamp tuesday
    Failed to parse "tuesday": Invalid argument
    Hint: this expression is a valid calendar specification. Use 'systemd-analyze calendar "tuesday"' instead?
    

    ಠ_ಠ

    $ for day in Mon Tue Wed Thu Fri Sat Sun; do TZ=UTC systemd-analyze calendar "$day 02-29"|tail -2; done
        Next elapse: Mon 2044-02-29 00:00:00 UTC
           From now: 19 years 4 months left
        Next elapse: Tue 2028-02-29 00:00:00 UTC
           From now: 3 years 4 months left
        Next elapse: Wed 2040-02-29 00:00:00 UTC
           From now: 15 years 4 months left
        Next elapse: Thu 2052-02-29 00:00:00 UTC
           From now: 27 years 4 months left
        Next elapse: Fri 2036-02-29 00:00:00 UTC
           From now: 11 years 4 months left
        Next elapse: Sat 2048-02-29 00:00:00 UTC
           From now: 23 years 4 months left
        Next elapse: Sun 2032-02-29 00:00:00 UTC
           From now: 7 years 4 months left
    

    still image from "Zach Galifianakis Math" gif, with Zach looking contemplative with math notation floating in front of his face

    (It checks out.)

    Surprisingly its calendar specification parser actually allows for 31 days in every month:

    $ TZ=UTC systemd-analyze calendar '02-29' && echo OK || echo not OK
      Original form: 02-29
    Normalized form: *-02-29 00:00:00
        Next elapse: Tue 2028-02-29 00:00:00 UTC
           From now: 3 years 4 months left
    OK
    $ TZ=UTC systemd-analyze calendar '02-30' && echo OK || echo not OK
      Original form: 02-30
    Normalized form: *-02-30 00:00:00
        Next elapse: never           
    OK
    $ TZ=UTC systemd-analyze calendar '02-31' && echo OK || echo not OK
      Original form: 02-31
    Normalized form: *-02-31 00:00:00
        Next elapse: never           
    OK
    $ TZ=UTC systemd-analyze calendar '02-32' && echo OK || echo not OK
    Failed to parse calendar specification '02-32': Invalid argument
    not OK
    

  • Funny that blog calls it a “failed attempt at a backdoor” while neglecting to mention that the grsec post (which it does link to and acknowledges is the source of the story) had been updated months prior to explicitly refute that characterization:

    5/22/2020 Update: This kind of update should not have been necessary, but due to irresponsible journalists and the nature of social media, it is important to make some things perfectly clear:

    Nowhere did we claim this was anything more than a trivially exploitable vulnerability. It is not a backdoor or an attempted backdoor, the term does not appear elsewhere in this blog at all; any suggestion of the sort was fabricated by irresponsible journalists who did not contact us and do not speak for us.

    There is no chance this code would have passed review and be merged. No one can push or force code upstream.

    This code is not characteristic of the quality of other code contributed upstream by Huawei. Contrary to baseless assertions from some journalists, this is not Huawei’s first attempt at contributing to the kernel, in fact they’ve been a frequent contributor for some time.