

Escalators and moving walkways are there to get you somewhere faster and with less effort. They are not meant to ferry your fat ass the entire way. That’s what elevators and carts are for. Move it!!!


Escalators and moving walkways are there to get you somewhere faster and with less effort. They are not meant to ferry your fat ass the entire way. That’s what elevators and carts are for. Move it!!!


I am paying for Cursor, which can use various models to help with software development. I use the AI to help me create design documents for software ideas I have and use those design documents to guide it in the development of that code. I’ve tried free models on my own hardware and they don’t come close, mostly because I don’t have a spare $5k for the right GPUs.


I mean, you can, or you can use it to assure your firewall is configured correctly. The entire Internet is scanning you at all times, why would you focus your attention on one of the services who is willing to share their results with you?
Believe me, you probably have lower hanging fruit to pick.
This is some ignorant FUD. Everything you just listed is technology companies, who get blamed for every computer failure whether its their fault or not, trying to prevent those problems. TrustedComputing and TPM is a direct answer to malware. UEFI a direct answer to ever increasingly complicated computer hardware, kernel-level DRM is a direct answer to software piracy and online game cheaters.
These things are implemented because there’s a lot of people making a lot of money ruining the lives of people who just want to use their computer. Just because YOU can’t explain it, doesn’t mean it’s evil.
Musicbrainz Picard --> mp3Tag --> MusicBee
There are portable versions of all three, so you can lock a version in your music directory and never worry about updates ruining your tags.


Who?


I don’t do that for a living anymore


The answer is an SSH reverse tunnel. Have privoxy running in the rPi listening on localhost. Have it then connect to your home server via SSH with reverse tunnels enabled, tunneling the privoxy port. On your home server you run another instance of Privoxy that’s listening in your home network and proxy forwarding over the tunnel and you’re done.
I used to use this setup for pen testing.
People who defend “they’re” as some form of grammatical purity. It’s a fucking contraction, basically the printing press version of an emoji. Stop with the pretentious bullshit.