NaibofTabr

joined 2 years ago
MODERATOR OF
[–] NaibofTabr 20 points 2 months ago (1 children)

You SHOULD NOT do software RAID with hard drives in separate external USB enclosures.

There will be absolutely no practical benefit to this setup, and it will just create risk of transcription errors between the mirrored drives due to any kind of problems with the USB connections, plus traffic overhead as the drives constantly update their mirroring. You will kill your USB controller, and/or the IO boards in the enclosures. It will be needlessly slow and not very fault-tolerant.

If this hardware setup is really your best option, what you should do is use 1 of the drives as the active primary for the server, and push backups to the other drive (with a properly configured backup application, not RAID mirroring). That way each drive is fully independent from the other, and the backup drive is not dependent on anything else. This will give you the best possible redundancy with this hardware.

[–] NaibofTabr 28 points 2 months ago (8 children)

Also im aware that base is not the proper term in this case since the base is still 10, but I have not idea how you would call the switch to the bigger unit treshhold

Actually "base" is entirely the correct term in this case. The first group to write down a really systematic method for timekeeping were the Sumerians, and they used base-60 math. This worked really well with solar and lunar cycles, which were important for crop planting, and with astronomical studies (mapping the stars had major applications for both navigation and religion, so it was culturally significant). Empires that came after the Sumerians copied and expanded their system, so it eventually spread to everyone.

[–] NaibofTabr 14 points 2 months ago* (last edited 2 months ago)
  1. If you are not already, start using a password manager. BitWarden, or VaultWarden if you want to self-host. Reset all of your passwords, starting with email addresses that are used to access other accounts, then financial accounts, government service accounts, healthcare accounts, etc.

  2. Reset the PIN numbers on your bank/credit cards, starting with whichever you use most frequently.

  3. Freeze your credit. Check your credit reports and make sure there aren't any new accounts you don't recognize.

  4. Consider getting a new phone number.

  5. Consider getting a new email address (with a provider that at minimum provides encryption at rest).

  6. Keep the official notice of the theft of your identity somewhere safe. You may need it to help prove that any new accounts created with your information are not legitimate.

  7. If you do find out that someone is illegally using your identity, check with your relevant government office. In the US you can apply for a new SSN if there's evidence that someone is actively impersonating you, though of course changing it creates a host of follow-on problems for you.

  8. Identity information is a commodity item on the Internet, with both legal and illegal information traders. If you're concerned about exposure, you might want to pay for a data removal service like EasyOptOuts or Delete Me. These services are not scams, they are effective for what they do, but they only work with legally registered data brokers. Having them submit deletion requests for your data will mostly remove it from OSInt sources and people search services. They can't actually delete your information from any sources that are trading it illegally or take it off the "dark web", and can't protect you from someone opening new credit accounts or impersonating you for job applications.
    The effectiveness of this is limited, and it costs money, which is why it's low on this list.

  9. Depending on what you do for work, consider letting your manager know. If your personal details could be used to access your employer's information system for some malicious purpose, giving them notice might help them avoid trouble and might save you from taking the blame for some illegal activity. I would mostly recommend this if you work for some government agency, healthcare organization, or financial institution where malicious access could harm other people.

[–] NaibofTabr 12 points 2 months ago (1 children)

They really don't want a precedent of being liable for environmental damage.

[–] NaibofTabr 12 points 2 months ago
[–] NaibofTabr 16 points 2 months ago (1 children)

The Alt key is Alt. Why would it need another label?

[–] NaibofTabr 4 points 2 months ago

I will start just taping these things into a little nook going forward.

This is what I do, along with any spare parts like screws. Put them in a plastic bag and then tape or staple them somewhere on the underside.

[–] NaibofTabr 26 points 2 months ago (1 children)

The 7th person is delusional.

[–] NaibofTabr 7 points 2 months ago

My love is a life taker...

[–] NaibofTabr -1 points 2 months ago

Hmm, the problem being essentially the core concept of representative government.

[–] NaibofTabr 35 points 2 months ago* (last edited 2 months ago) (1 children)

Although multi-layered air defense is always built around such objects. But now allowance can be made that this system was just put into operation, and such defense simply wasn't built yet.

wut.

This, er, attempt at journalism doesn't list an author, and the writing sure sounds like AI garbage that was trained on elementary school essays.

[–] NaibofTabr 7 points 2 months ago* (last edited 2 months ago) (1 children)

Which means it's the US on one side an the rest of the world on the other

It won't work out this way, no matter what happens.

  1. Pacific Rim nations will probably stick with US interests over European interests, because the US is the only thing between them and China (at the moment). Europe doesn't have the global presence or the interest to operate in the Pacific. This includes: Taiwan, Japan, Australia, New Zealand, South Korea, Singapore, the Philippines, etc. Even if the US is showing itself to be a less reliable partner, it is still not (yet) an active threat to their interests the way that China is.

  2. Ukraine under Zelensky won't just surrender to Russia and will probably tolerate a lot from the US in order to continue their defense efforts unless they are somehow offered EU membership/protection explicitly. I could see Ukraine breaking ties with the US if it meant joining the EU.

  3. The above might give Trump the excuse to say openly that Ukraine "didn't want peace" (via surrendering to Russia) and then declaring open support for Russia in the name of "peace". Then it's an out-and-out US-Russia partnership.

  4. China will continue to pretend neutrality, continue to manipulate its rivals into destabilizing, continue using its neighbor countries to export its environmental disasters, and then invade Taiwan. If that doesn't provoke direct conflict with the US, the rest of the Pacific Rim starts to look really vulnerable.

  5. South America is... complicated. Obviously a lot of nations like The Dominican Republic and Colombia would side against the US with Venezuela. Argentina wouldn't. Is Venezuela under direct US control/occupation at this point? Brazil is a founding member of BRICS, so they're probably aligning with China and/or Russia, but they'll probably stick to conflict avoidance as much as possible.

  6. India might make some public statements of condemnation of imperialistic behavior to score political points, but that would be it. The only way they get involved in any conflict is if China is on the other side (or maybe Pakistan, but that's more complicated).

  7. Iran is in so much trouble right now with Tehran being completely out of water, and the internal economic strife. They're still a power in the region, but not really in a position to influence things beyond their borders.

  8. Canada won't support US aggressive actions, but will also do almost anything to avoid direct conflict with the US. That's a very difficult position which will produce confusing, noncommittal and seemingly self-contradictory actions and statements.

  9. Africa...? No idea, really.

view more: ‹ prev next ›