Fijxu

joined 2 years ago
[–] Fijxu 15 points 2 days ago

Get kids out of social media

[–] Fijxu 5 points 1 week ago

Top level shitposting

[–] Fijxu 127 points 2 weeks ago (4 children)
[–] Fijxu 2 points 3 weeks ago

Just as a note, NVIDIA on Linux is not bad, BUT IS REALLY ANNOYING because you will get some random bugs that are only exclusive to NVIDIA cards. Like this one: https://forums.developer.nvidia.com/t/non-existent-shared-vram-on-nvidia-linux-drivers/260304

If you have a low VRAM NVIDIA GPU and you want to play a modern game, you will have a bad time. (However, AMD and Intel should work just fine lolol)

[–] Fijxu 7 points 3 weeks ago
[–] Fijxu 1 points 3 weeks ago

RECURSION!!!

[–] Fijxu 2 points 3 weeks ago
[–] Fijxu 3 points 3 weeks ago

I don't trust cloudflare. That is just a JS CDN that pulls a file, but is still gathered from an external server. In my case, when I have to use CDNs to use a JS library, I just download the file and host it locally.

You don't own the CDN, is controlled by other people, which means that of course is less private to the end user, and more insecure since you rely on the people running the CDN and the author or the library. What would happen if the library author/authors get hacked and they add malicious code to the library? (Asumming it doesn't contain a integrity attribute like the one on your example).

Is better to trust yourself, it doesn't cost you anything to download a few kB of a JS file and serve it directly from your server. The page is not going to load 2s faster if you use a JS CDN

And no one wants this to occur to their websites: https://fossa.com/blog/polyfill-supply-chain-attack-details-fixes/

[–] Fijxu 1 points 4 weeks ago (1 children)

How do you guys can see a deleted comment wtf. I deleted it for a reason, because I noticed that my comment was dumb and stupid after I posted it

[–] Fijxu 39 points 1 month ago (11 children)

Man, does ANYONE needs this? Probably no one. This addition is just another way to force people to use AI so they can gather more personal information about that person. Specially with Notepad.

Will people be able to do thing without AI on the future if it's being pushed so hard on everything? Like, they want to make our brains smoother and dumber lol

[–] Fijxu 28 points 1 month ago (1 children)

I was going to say this. Linus took some months to think about the design of Git before even writing it.

 

This is not a long post, but I wanted to post this somewhere. This may be useful if someone is doing an article about Google or something like that.

While I was changing some things in my server configuration, some user accessed a public folder on my site, I was looking at the access logs of it at the time, everything completely normal up to that point until 10 SECONDS AFTER the user request, a request coming from a Google IP address with Googlebot/2.1; +http://www.google.com/bot.html user-agent hits the same public folder. Then I noticed that the user-agent of the user that accessed that folder was Chrome/131.0.0.0.

I have a subdomain and there is some folders of that subdomain that are actually indexed on the Google search engine, but that specific public folder doesn't appear to be indexed at all and it doesn't show up on searches.

May be that google uses Google Chrome users to discover unindexed paths of the internet and add them to their index?

I know it doesn't sound very shocking because most people here know that Google Chrome is a privacy nightmare and it should be avoided at all times, but I never saw this type of behavior on articles about "why you should avoid Google Chrome" or similar.

I'm not against anyone scrapping the page either since it's public anyways, but the fact they discover new pages of the internet making use of Google Chrome impressed me a little.

Edit: Fixed a typo

 

BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the 'mp3' program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as 'telnet', which is used by hackers to connect to machines on the internet without using a telephone.

view more: next ›