Can you isolate the call to the sound from the DevTools? And if so, does DevTools allow you to edit the function? Perhaps you could GET/POST something on localhost which could trigger a shell script.
qjkxbmwvz
Can someone ELI5 why this even matters/is such a big deal? Does the default DE have its tentacles so deep in the distro that it can't be changed by users to suit their preferences?
I run i3 on Debian, and...well, actually, there is no "and," I just installed the WM I wanted and that was it. And as I recall the installer asked what DE/WM I wanted to install anyway.
Yes, just not the people who hang out on Linux communities on federated social media.
They appear to also have blocklists independent of "shit ton of traffic." I have a VPN to my VPS (Oracle), which has a public IP (and I'm the only user). I also get whoa pardner'd when going through that VPN.
Perhaps I fall into the "we don't want other people scraping our site unless they pay" category though. I would make sense to just block off all VPS/cloud IP blocks (e.g., AWS, Azure, Oracle, Google Cloud...).
I agree.
I think a good example is how Slack started off by having good IRC integration, then slowly added features which were incompatible with IRC, and finally terminated IRC integration.
So clearly, Slack killed IRC, right? (...of course they didn't!)
I see the potential situation with Threads as similar.
Maybe I'm naive but I kinda don't get it. People talk about defederating as if...what, all Meta IP addresses will be magically blocked from scraping your content? Any script kiddie can harvest Lemmy/Mastodon/whatever content.
Has Meta shown itself to be a bad actor? Yes. Should my email provider block all emails from Meta? Well...that's a bit much I think? If Facebook email still existed, should my email provider block that?
My point is yes, Meta bad, but all Thread users also bad? I thought
and apparently I'm very wrong here
that the Federation paradigm was kinda like email. And the only email I want blocked is a domain where every single user is malicious, not a domain run by a malicious entity which has normal people as users, who aren't necessarily very tech literate.
I don't actually care, but I just find it a little confusing tbh.
Yeah but that's nowhere near as cool of a band name.
I think parent is hosting on their own physical hardware, just using a VPS for a public IP. I do the same (I use WireGuard instead, but similar idea). The VPS is doing the same thing as Cloud flare in your setup. I'm a proponent of this setup because the only reliance is on a totally generic VPS, of which there are many providers.
Don't you already need your company email for verification? Mapping company email to real name is obviously trivial for your employer...
Not sure how reverse proxy is avoided this way
do you enter port numbers for your services when you access them, or have one service per machine?
I have a few publicly accessible services, and a bunch of private services, but everything is reverse proxy'd
I find it very convenient, as for example I can go to https://wap.mydomain.net for my access point admin page, or photos.mydomain.net for my Immich instance. I have a reverse proxy on my VPS for public services, and another one on my lan for private services; WireGuard between VPS, LAN, and my personal devices. Possibly have huge security holes of course...
Similar with Y2K
it was only a nothingburger because it was taken seriously, and funded well. But the narrative is sometimes, "yeah lol it was a dud."
Professor should know that it's etymologically Greek, not Latin, so octopi is generally considered to be wrong.
Octopuses, or octopodes if you're feeling badass, would be preferable afaik.