• 0 Posts
  • 29 Comments
Joined 1 year ago
cake
Cake day: November 21st, 2023

help-circle

  • I tried installing Matrix with the Element web interface a few days past, and was positively surprised by the VoIP and screenshare.

    I always thought that Matrix was this dusty old legacy from times long forgotten, but once the images were spun up and the reverse proxy configured, it didn’t take long to setup a small test community and invite a friend.

    There’s a beta option to enable screenshare in a room, but we found that you can screenshare in any voice room despite the setting. We only tested with simple visuals like videos and text documents, where we got small amounts of artifacting, so I’m not sure about the compression and throughput, but I hope it’ll be enough for gaming.


  • “Is this ‘Critical Error’ the reason for the crash, or just another ill-labeled exception?”

    I love WINE and it’s forks, but man, how can any program produce so many errors during optimal operation? (A rhetorical question, as I believe we all know the tragicomedic reason being Microsoft)






  • Ekky@sopuli.xyztoFediverse@lemmy.worldAnother random blip in the stats
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    4 months ago

    And the above was literally how I was thought to represent data in university. Maximize the areas of interest, make sure to properly label your axes (lest they become misleading), and remember to trim empty space where relevant.

    But it appears that proper graphs for science and engineering reports may not be used for representing data to the common man, as it must be assumed that, even for the most simple of graphs, the common man will only look at the funny line, but not the graph itself.







  • Ideally, a .mp4, or any other non-executable file format, would not be able to execute rogue code on your computer, but the programs you use to open the files with might have security flaws which allow rogue code execution if done right.

    You might have a hypothetical file, which might not be dangerous if opened with VLC, but which exploits a flaw in, say, Windows Media Player version x.y.z to execute a payload.

    Sorry, for not including any examples, I’m currently not at the PC.





  • I’m gonna be honest: I’ve been skimping on anti malware since i moved to Linux.

    Still keeping up the common sense part about running code you don’t know and running untrusted code and weird URLs in a virtual environment (well, except for the AUR perhaps), but I only scan for malware once or twice a year, if at all.

    Actually, I just did a scan with RKHunter which came back clean except for the usual false flags, which I find mildly suspicious as one would imagine there to be some malware with all the small time programmers and script kiddies in the Linux community.

    What are you using as anti malware? Anyone knows of good methods for set-and-forget or some good GUIs for easy containment management, scanning, and whitelisting? It can’t be that ClamAV, RKHunter, and chkrootkit are the only halfway decent AVs out there.


  • Huh? That’s quite interesting.

    I’ve been running a hacked-together script which uses a disembodied copy of Proton 8 (aka. copied to a portable drive, doesn’t need to have Steam installed to run) to launch my games from Itch and GoG.

    Hmm, just tried to use Proton 9.0-2 and the current experimental in my steamapps (which appears to be version 9.0-202), and it works just fine. Though, I guess Lutris’ implementations are quite a bit more advanced than my hacks (no debugging let’s goooo).

    A very simplified version of my script, for those who might be interested: pastebin.com/kbNNvzAx. Don’t forget to uncomment game_exe and set it to your executable - won’t work otherwise.

    Also, pinging @[email protected] in case of interest.


  • I guess you could also ask: “Does the pro-tier give one any options/additional functionality that the non-pro/non-donation tier doesn’t?”

    Obviously, if you have to pay for additional functionality (like settings/themes/updates) then it isn’t a simple ask for donation. Though, I’d argue to ignore trivialities such as “thank you”-emails and possibly a small visual-only token on the program that you paid/donated, as those barely count as “functionality”.