

Could be a gen 5 nvme drive without adequate cooling. Them bastards can run hot. Especially the early gen 5 drives.
Could be a gen 5 nvme drive without adequate cooling. Them bastards can run hot. Especially the early gen 5 drives.
Yes, but this may be a symptom of an issue I’ve been seeing with younger programmers; they’ve siloed themselves so specifically into whatever programming they “specialize” in, that they become absolutely useless at dealing with absolutely anything else related to their job. And exasperating this issue is the fact that they’ve grown up with systems that “just work”. Windows, iOS, and android are all at the point where fucking around with hardware issues is very uncommon for the average person.
Asking this guy to solve a hardware problem is like asking hime to tune a carburetor. He likely has not the slightest clue how to start.
Since you can’t use your mirror anyway, just adjust it so that it reflects back at them.
So if I’m understanding correctly, once I get rich from winning the lottery, I should build myself a sleeper with a “Hideous and Horny Commune” bumper sticker on the back.
Never thought of that. In my use case, Transmission is running in a container on my server, so it only ever has one connection, and VPN and traffic management happens on my router.
Do people still use transmission? That seems like be the default one I see in prebuilt torrent server containers.
Him looking vaguely like Winnie the Pooh, and more being mad about it.
Referring to him as “Winnie the Pooh” has never had anything to do with race, hence why no one uses it to refer to any other Chinese person.
Measuring my server cluster
Personally, I just don’t ask questions I don’t want the answer to.
Lol, no worries.
All traffic from that device is going to pass through the router. In order to start communicating with the other device, the first device has to send a packet. The router sees that packet, and routes it to the other device. If there’s no internet connection, things die here, but the router still saw that initial packet.
Depends on the router it’s hooked to and the level of traffic logging being performed. Being connected to a LAN is not the same as being connected to the internet.
Might also not be this device that was specifically targeted. The backdoor could have been placed in component firmware for any generic components this device uses, or in some general software library that gets used all over the place.
Might not be. This could have simply been some IT guy noticing that something kept trying to ping the outside world.
Removed by mod
Removed by mod
And how has that turned out for Gaza so far? Probably not the example you should be looking to replicate.
I think the other thing that people need to remember is that when online on platforms like Lemmy, Twitter, etc, you aren’t just having a one on one conversation. There are other people reading the exchange. People who would otherwise be allies, can still be alienated, even without anyone directly saying anything to them.
Also, there seems to be far too many people who are willing to let perfect be the enemy of good. If your opinions don’t exactly match theirs, you are indoctrinated, evil, stupid, malicious, etc.
All you have to do is come up with a new name for it. It’s not like any of them have a clue about what socialism actually entails.
I’m not asking everyone to be able to become a hardware specialist, but if you can’t even figure out “my computer gets hot” I’m not going to be able to trust anything you do. Identifying a heat issue does not take a rocket surgeon.