

Who said I was wasting my time? There’s entire communities dedicated to reposting ml mod log shit. It’s hilarious watching you fuckers constantly trying to censor the smallest things for the stupidest reasons.


Who said I was wasting my time? There’s entire communities dedicated to reposting ml mod log shit. It’s hilarious watching you fuckers constantly trying to censor the smallest things for the stupidest reasons.


Oh you’re one of those. So are you the Russian or MAGA type? Which dumbfuck propaganda machine that relies on having no individual critical thinking capability do you get your talking points from? Doesn’t really matter, it’s all the same in the end.
I’m not a mod or an admin. But ml is well known to block anything critical of Russian propaganda and claim all sorts of unrelated reasons that never actually apply. Just taking a quick stroll through the public mod logs shows that every day. Just imagine what they’re scrubbing from public view.
Giving winring0 vibes.


Removed by mod
Of course not. Just pointing out that it’s probably bullshit just like previous similar claims. The exact thing its making fun of.
There were plenty of articles claiming similar for her dogshit. Where’s the peer reviewed studies?

Note this is not ICE. This is the Diplomatic Security Service, the State Department’s agents.
It’s not just ICE that get the dipshits nowadays apparently.


Of course they are, because that’s what Russia wants. They’re posting an article from a Russian state-controlled media outlet. The US administration, and the currently run by a friend of Putin for over 40 years, proposing a Russian solution isn’t very surprising.


Microsoft just needs to start kicking shit out of the Kernel. Allowing any of it is inherently insecure on a fundamental level.


Depends on whether they negotiated contract pricing beforehand. The price increases aren’t because of manufacturing cost increases, they’re because of high demand. Retail pricing isn’t really related to bulk wholesale contract pricing at all.


Meanwhile it is for other companies that use it to authenticate you.


It is. And so do I. The terminal isn’t hard, it’s just for the average user, it feels intimidating and/or extremely old and thus inherently bad. They rely on the GUI as the user experience. And to be honest, they’re right. A modern system should not require terminal interaction for every day use cases, or even infrequent use cases. It’s just not a user-friendly interface for a consumer.
And that doesn’t even get into the youngest generations that have grown up with touchscreens, where many can barely use a mouse. Even those most would probably consider to be more tech-literate, like gamers. PirateSoftware (I know, I know, but it is a real world interaction versus theoretical) brought a demo to one of the conventions, with 2 stations for a game, 1 KB&M and 1 controller. For the few kids that tried to use the KB&M stations, they moved the keyboard out of the way and tried to touch the screen to interact, because they didn’t know how to interact with it like that, they knew how to use a controller and a touchscreen. That was how they played games. Their tablets, and controllers probably on consoles. Youtube Shorts video explaining. That’s the average user. No one anywhere near a place like lemmy is an average user.


It’s nothing about learned helplessness, it’s about what the average user experience is for new and inexperienced users. And terminal commands are just not new user friendly. If Linux ever wants to consider being true competition for a Windows replacement with the average user, it has to provide easy to use GUI options for most commands, and it needs to do all basic functionality without a terminal ever being needed.
Like @user224@lemmy.sdf.org posted elsewhere in the thread, KDE has a good GUI for an end user experience for this exact situation. It shows files are open from the device, and what has them open, in the same interface an end user would use to eject the drive.


And the same works 99% of the time in Windows. We’re talking about the small fraction where pressing eject doesn’t work for whatever reason.


It’s insane how nose-blind Windows users are to how user-unfriendly their OS is.
Oh the irony. You clearly don’t work with any sort of end user.
For 99% of computer users, if the GUI doesn’t have an option, it doesn’t exist. They aren’t searching past a basic Google of the issue showing them step by step instructions of how to use the GUI to fix the problem. If there is no way to do so in the GUI, it’s not getting fixed by them, they’ll take it to the Geek Squad if they even decide to fix it at all. They’re must more likely to just ignore an issue. In this case, just removing the USB drive and complaining about something being corrupt later on. The idea of the terminal scares the average person.
Windows doesn’t even have basic package management like every Unix-like OS does Well that’s simply wrong.
winget upgrade --allI just upgraded 44 apps I definitely didn’t install via winget, they were all installed via individually downloaded installers at some point in the past, but all upgrade with a single package manager command in a terminal. Certainly seems similar to me. It may not be everything, but it’s certainly the majority of things on this system other than the games.


By default Windows disables file caching on external USB drives. It should be writing those files directly. That doesn’t prevent a program from locking a file or folder that it is using though.


So a complicated set of terminal commands and alternatives you need to have memorized ahead of time. That’s definitely the linux solution. You can do it, but no average user would ever be able to when they need it.
Windows probably has some equally complicated way of finding what is locking a file/folder… or you can just install File Locksmith which is a Microsoft PowerToys tool, and just have it in the context menu everywhere.


There’s a lot more than just recognizing known raw IP addresses used as endpoints.
One method larger services with CDNs use effectively is to use DNS for blocking. When you try to access a site, your DNS request will resolve to a server close to you, with your location determining the domain resolving to a different IP. Then the platform just responds to those requests from outside their normal area with a consistent message. No need to know whether it’s actually a VPN or not, the traffic is acting like it is and doesn’t really have much of a reason to do that normally.


VPNs aren’t hard to detect, especially if you’re using a major service.
Kitchen scales measuring accuracy and to a hundredth of a gram for instance.