• 1 Post
  • 305 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle
  • Windows and DOS games started working well later, as WINE and DOS emulator were evolving.

    But Linux had a thriving gaming scene of its own:

    • You’ve already mentioned Loki who made native ports.
    • Another type of “ports” were game engines made from scratch that used the level files of the original, games like Doom, Transport Tycoon, Caesar III, Panzer General, Stunts, ReVolt etc. You had to own the game files but the executable was FOSS.
    • There were lots of cool native games, many shooters (Warsow , Nexuiz, Cube, Tremulous), strategy games, cool arcade games (Tux Racer, Atomic Worm, H-Craft, Droid Assault), the rogue genre which debuted on UNIX and had tons of variants and so on.

    I’m only a casual gamer so this is just stuff I ran across occasionally, there was probably more.



  • Why do you want to use Shouko? Yeah it can bulk-tag anime but it doesn’t necessarily do a better job than Jellyfin with AniDB plugin. Also, it tends to hammer their API like an idiot and will get your user temp-banned or even perma-banned (depending on the size of your collection), while the Jellyfin plugin has rate limits.

    I used it once when I was moving my collection to Jellyfin and I barely got my account back.

    I would strongly suggest using just the regular Jellyfin plugins and adding titles to the directory in small batches and taking breaks if it stops recognizing them because it means the API is throttling you.



  • For me, educational stuff was all windows with a small amount of macs and I don’t think I ever saw a Linux system in actual use anywhere.

    Linux systems started being common in CompSci schools around mid-90s, around the time LAMP took off (fun fact, Apache, MySQL and PHP were all launched in 1995).

    Previously in CompSci you’d get to use all kinds of UNIX servers. My uni still had Solaris servers with dumb terminals, and I got my first sysadmin certification on SCO.UNIX / OpenServer.




  • I am still hoping it will hit 10% market share within my life time.

    Do we really want that?

    We have it pretty good right now. I would actually say we’re living in a golden age of desktop Linux: there’s constant innovation, good support, you get to do pretty much everything you need, while flying under the radar.

    Linux has won the majority of the industry (servers, mobile etc.) so it’s not like it has anything left to prove.

    If it starts getting noticeable on the desktop I fear we’re just gonna get negative attention. Users who take and not contribute, because Windows had taught them to be entitled. Unwanted attention from Microsoft, who I bet are not going to be doing nice things once they start getting paranoid about it.

    I really don’t think that large companies like Adobe will care about Linux even at 10% and even if they did, they are a super toxic company nowadays, the least we get to interact with them the better.


  • Many people have a warped understanding of what “two factor” means.

    They conflate it with devices and they think it means that one of the factors (why one? which one? who knows) needs to be restricted to exactly one device.

    What “two factor” really means is that you should have more than one required factor of authentication so that if one is compromised the attackers still can’t get in.

    Ideally the factors should be spread across the “something you know” / “something you own” / “something you are” categories to complicate the manner in which they can be compromised.

    We can only reliably rememeber a limited amount of passwords, so like it or not we have to use some devices at least some of the time.

    The trouble with “something you own” is that it can be lost or damaged or stolen, and if you only have one of it then you’re fucked. So adding some redundancy is not a bad idea.

    The larger issue is that everybody is stuck into extremely rigid and outdated mindsets that date back decades. “Two factors” don’t have to be exactly two, and they don’t have to include exactly one password, and so on. It should be fine if you wanted to secure your account with 3 passwords, and should be up to you if one of those password is a barcode tattooed on your taint so you need a mirror and to bend upside down to scan it.

    Bottom line, use whatever you want and use your best judgment as to how secure is each factor. If you want to use something that syncs to multiple devices, go ahead. What you should consider is who has access to those devices and how it would affect you if they’re lost or stolen.







  • If you mean to do that in the public DNS records please note that public records that point at private IPs are often filtered by ISP’s DNS servers because they can be used in web attacks.

    If you don’t use your ISP’s DNS as upstream, and the servers you use don’t do this filtering, and you don’t care about the attacks, carry on. But if you use multiple devices or have multiple users (with multiple devices each) eventually that domain will be blocked for some of them.