• 0 Posts
  • 27 Comments
Joined 2 months ago
cake
Cake day: May 20th, 2024

help-circle
  • Doubtful that the military would actually do that. Trump while President was reportedly annoyed at basically being told ‘no’ that General Kelly said that:

    The President’s loud complaint to [then-White House chief of staff] John Kelly one day was typical: “You [f------] generals, why can’t you be like the German generals?”

    “Which generals?” Kelly asked.

    “The German generals in World War II,” Trump responded.

    “You do know that they tried to kill Hitler three times and almost pulled it off?” Kelly said.

    But, of course, Trump did not know that. “No, no, no, they were totally loyal to him,” the President replied.

    The President may be Commander-in-Chief but the oath is to the Constitution. Obeying the President and officers are also a part of the oath but with the caveat that it is according to the regulations and UCMJ. You not only don’t have to but you’re taught to explicitly not follow an illegal order in the US military.

    Not that US military members have given illegal orders that were followed but it is a little different to basically order the military to essentially start enforcing essentially a government coup for a politician against the US’ own citizens.



  • On the one hand LA county has a massive crime issue and the masks aren’t helping. On the other hand, even without masks they still had a crime problem anyway because LASD (almost $4bn budget) sucks at their jobs and there isn’t a lot of support of the current Sherrif from deputies that has been trying to fix them. LAPD ($2bn budget) basically only takes care of the main part of LA city proper itself.

    Where I live break-in response times are around 4 hours and anything under that is measured in days, if they show up at all.


  • Maybe…Congress has impeached one Supreme Court Justice in history, Constitution Article 2, Section 4..

    The Article itself stays within the scope of the Executive Branch but the Section itself just says:

    The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors.

    Likely, if Congress tried, it would be argued that the scope is only the Executive Branch.

    Article 3’s scope is the Judicial branch but says in Section 1:

    The judicial Power of the United States, shall be vested in one supreme Court, and in such inferior Courts as the Congress may from time to time ordain and establish. The Judges, both of the supreme and inferior Courts, shall hold their Offices during good Behaviour, and shall, at stated Times, receive for their Services, a Compensation, which shall not be diminished during their Continuance in Office.

    However, Samuel Chase who was appointed as a Supreme Court Justice by George Washington and confirmed by the Senate was impeached by Congress in 1804, and other federal judges (some having life-time appointments apparently) were dissolved.

    Samuel Chase ultimately was acquitted by the Senate in 1805 however.



  • It’s also difficult for developers to publish to Linux because of the wide variety of different Linux systems.

    I disagree there. The issue is that in Windows people bring over their own version of libraries they compiled on (the millions of .dll files) and you can even look in your Uninstall Apps settings where there’s a bunch of MS specific runtime bundles to see that’s even an issue in the MS ecosystem.

    In Linux, developers have relied on the library versions just being there. It is, I’d argue, the most compelling reason package managers basically had to come into existence. On the flip-side this can cause issues where there is some version on the system by the package manager that replaces another version. And something not a part of that package management system isn’t a part of those dependency checks and if they don’t put the libraries with the binaries…well it is just luck if you have them all or if other versions can support those library calls in the same way still.

    In Linux that is all those .so’s in /var/lib and stuff.

    You don’t really see many proprietary things using package managers and those that do are packaged by someone else and are in some sort of repo that isn’t part of the vanilla install because of legal caution.

    Companies that made their money on porting games to Linux prior to Proton basically causing them to shutter Linux porting would put their .so’s in with the game bundle themselves, just like you see happening in Windows when .dll’s are inside the actual program’s folders.

    However, the more that this sort of dependency management has become abstracted by development suites that take care of this for the developers, the less they understand about it.

    Flatpaks actually take care of this and it is one reason they are so popular. They figure out (well that’s a simplification) those library dependencies, sandbox the apps with those dependencies so the library paths don’t interfere with other flatpaks or the base system itself. People complain about this as a con because “the download is BIGGER” even though flatpak doesn’t install the same runtimes over and over again, so once they are there, the download may still be bigger but the installed storage isn’t.

    Anyway, yes Linus Torvalds complained about the “Linux fragmentation” issue but it was about DE’s not the state of the development ecosystem itself as I recall, though the rant is very old, so maybe I don’t remember all of it.

    Wider application support would be a start.

    Sure, but that’s not a Linux problem, that’s a developer problem. Linux supports application development just fine. It is a kernel and the surrounding ecosystem is the operating system after all. It is developers that don’t support it. That isn’t really something Linux in and of itself can effectively solve. Users have to increase and developers supporting applications for Linux will also increase. The classic Linux Chicken and the Egg problem but it is capitalism and that’s just going to be how it has to work.



  • Avatar_of_Self@lemmy.worldtomemes@lemmy.worldThe latest Ads
    link
    fedilink
    English
    arrow-up
    3
    ·
    21 days ago

    a stack of 18650s

    (you probably already know) but this is common in a lot of battery packs. Batteries for power tools are good sources for the 18650s too. I never checked but I saw someone open a Tesla car battery and they look like a bunch of 18650s inside too.

    I refurbish my power tool batteries instead of buying new ones because it is so easy.


  • Having a NAT on a consumer router is indeed the norm. I don’t even see how you could say it is not.

    I never said NAT = security. As a matter of fact, I even said

    It was not designed for security but coincidentally blah blah

    But hey, strawmanning didn’t stop your original comment to me either, so why stop there?

    Let me tell you: All. Modern. Routers. include a stateful firewall.

    I never even implied the opposite.

    To Linux at least, NAT is just a special kind of firewall rule called masquerade.

    Right, because masquerade is NAT…specifically Source NAT.

    I’m just going to go ahead an unsubscribe from this conversation.




  • Because, as I said:

    layer 7 firewalls for the network which are going to be where most the majority of attacks are concentrated.

    The NAT doesn’t have to operate at layer 7 to be effective for this because

    coincidentally it is doing the heavy lifting for home network security because it is dropping packets from connections originating from outside the network, barring of course, forwarded ports and DMZ hosts because the router has no idea where to route them.

    The point is that the SPI firewalls are not protecting against the majority of the attacks we’ve seen for decades now from botnets and other arbitrary sources of attacks, except, perhaps targeted DDoSing which isn’t the big problems for most home networks. They must worry about having their OS’ and software exploited and owned in the background, which doesn’t get much of an assist from a router’s firewall.

    Obviously, this is however true for the NAT since the NAT are going to drop connections originating from outside the network attempting to communicate with that software to exploit it

    barring of course, forwarded ports and DMZ hosts because the router has no idea where to route them.



  • The word you are looking for is firewall not NAT.

    No the word I’m looking for is the NAT. It was not designed for security but coincidentally it is doing the heavy lifting for home network security because it is dropping packets from connections originating from outside the network, barring of course, forwarded ports and DMZ hosts because the router has no idea where to route them.

    Consumer router firewalls are generally trash, certainly aren’t layer 7 firewalls protecting from all the SMB, printer, AD, etc etc vulnerabilities and definitely are not doing the heavy lifting.

    By and large automated attacks are not thwarted by the firewall but by the one-way NAT.







  • It really depends on what model you want to run and how much training is bundled with it. You can pretty much run any model if you have enough disk space but of course GPU + VRAM is preferred for a ChatGPT like fast response. Otherwise, running on an older CPU and RAM is going to be noticeably slower, especially with complex models with a lot of training data to trawl through.

    There are some pretty lite models out there but the responses will be more barebones and probably seem ‘less informed’.

    Give GPT4All a try for your first time. It makes install, configuration and usage point-and-click while being fairly straight forward. For the presented/featured models, it presents a small summary and VRAM recommended, though there are many, many other models available from inside the UI.