Rose here. Also @umbraroze for non-kbin stuff.

  • 1 Post
  • 32 Comments
Joined 1 year ago
cake
Cake day: June 14th, 2023

help-circle



  • I watch a lot of “lost media” discussion channels.

    There’s been a lot of lost media searches where the people looking for the thing suddenly found a crucial hint when someone who worked on the project posted a 2.5 second clip of the thing in question in a video cv / showreel.

    Expect a lot of that in the future. Except about media that probably didn’t even get released at all in the first place.


  • umbraroze@kbin.socialto196@lemmy.blahaj.zonerule
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    Kids these days get worried about computer noises???

    I slept for years with my Linux desktop/server next to my bed, running 24/7, with a hard disk drive and cheap-end cpu/case fans. The only time I was bothered when the original case fan went bonkers and started making hell of a racket.

    (I don’t use that thing any more, because it got way too obsolete, but I still have a NAS box with a fan and hard drive and it’s not bothering me at all.)


  • Reddit has an user data checkout feature (IIRC, check out the user settings or maybe reddit help pages to find it).

    It’s a bit crap though.

    It takes a long time to process, especially if you happened to post in the era when the Reddit data infrastructure was horribly terrible instead of merely ordinarily terrible, and apparently this involves some handwork in the worst cases on behalf of the staff.

    Some data may be missing or truncated. It doesn’t give you data from privated/banned subreddits (which was a fun thing to discover because last time I tried to do this the blackouts were on), and even for legit stuff, long comments/posts may be truncated. Even so, I’m pretty sure that the dumps just straight up didn’t have all of my posts from several years ago, even if those were on public subreddits. So you need to make sure the checked out data is sensible.

    In conjunction to the official dumps, I recommend a few other tools, especially since the dumps aren’t really magnificently usable on their own. One tool that I found personally invaluable is reddit-user-to-sqlite, which allows you to import Reddit data dumps and available live user data (I think it does this by scraping or something, I’m sure it worked despite the API being shut down) to sqlite database, and Datasette is a nice frontend for browsing the posts.

    As for scrubbing, there’s tools for that are supposed to work. I think.




  • There are as many types of gaming as there are categories of clothing and apparel, then.

    …Hazmat gaming: 1) (console gamers) doing couch co-op on someone else’s couch and you really don’t want to think about the condition of the couch in question. 2) (PC gamers) gaming while doing Half-Life cosplay? Dunno? Something???








  • I was a Slashdot user.

    People kept hyping Digg as a Slashdot replacement, but trying to submit posts was actually even more futile in practice than trying to submit articles to Slashdot editors. So much bigger hivemind too. Boring unfunny comment section.

    When I first joined Reddit, it seemed like it was mostly populated by Slashdot refugees. Just people posting awesome shit. Great riveting discussions, even before anyone actually read the articles. That sort of stuff.




  • Depends on the type of account, but here are some of the common methods of how this might happen:

    • The attacker could be straight up guessing the password. (One possible way to mitigate this: the website can go “wow, 10 failed login attempts from that source. I’m going to ignore all attempts from there for 24 hours.”)
    • The attacker could be using previously exposed passwords. (One possible way to mitigate this: The websites should immediately require password reset for all users when that kind of data breach happens. For users: never use same password for multiple different services, certainly never reuse a compromised password even if it’s for a different service. Also: haveibeenpwned.com)
    • The attacker, currently using the same network, could hijack the session. (This was a really huge problem back in the day. In this day and age, websites should be using HTTPS, which limits this very much. Still possible if the site doesn’t use HTTPS, and through some other vectors, e.g. malware or hijacked network hardware).

    Also: Malware is a really scary big problem in that they’re rarely targeting you specifically. Why do that, when they can million people at the same time and sift through that stolen data for most valuable stuff, right?



  • Technically, SQL is case-insensitive.

    Practically, you want to capitalise the commands anyway.

    It gives your code some gravitas. Always remember that when you’re writing SQL statements you’re speaking Ancient Words of Power.

    Does that JavaScript framework that got invented 2 weeks ago by some snot-nosed kid need Words of Power? No. Does the database that has been chugging on for decades upon decades need Words of Power? Yes. Words of Power and all the due respect.