I’m the administrator of kbin.life, a general purpose/tech orientated kbin instance.

  • 0 Posts
  • 174 Comments
Joined 3 years ago
cake
Cake day: June 29th, 2023

help-circle
  • I’d say the ideal situation is that tools are developed library first, then cli or gui as preferred allowing others to pick up the slack and make the other tool (or tools) using the functions in the library.

    One of the reasons automation is so much easier on linux than windows is because there are many more cli tools to do things. On windows many tools are gui first and cannot easily be automated.




  • I have a 3080, so 590 is fine for me. But, I’m sure the legacy one is a dkms. But the process of installing that should be done as part of the install. E.g. you install, reboot

    What does lspci -k show for the card in terms of Kernel driver in use, and kernel modules? Also what does dkms status say?

    If the module is installed and showing in dkms status and showing as used in lspci -k, it should be available for desktop environments.

    I do agree in terms of effort when things go wrong though. I remember when I was a lot younger and I had no problems just sitting in front of my keyboard finding whatever the latest problem is. Now, I want to be doing things with my PC.

    But, a bit of debugging might be worthwhile before doing a new installation.



  • Are you sure it was dot pitch and not dot clock?

    Dot pitch on a crt might make the image look bad (trying to draw onto the shadow mask) but I doubt it would damage it.

    Setting an invalid dot clock could damage some crts. But most of the modern (read from mid 90s on) would just go to the power save mode when they got a clock they couldn’t use. The warning did still remain on the xfree86 configuration guides though.

    Showing my age perhaps.












  • With IPv6 for most use cases there’s actually more security. With privacy extensions (pretty sure it’s enabled on windows by default), when you make connections from your device, it uses a “private” IP. That is a randomly chosen address inside your network’s prefix, that changes regularly.

    These addresses don’t accept incoming connections. You have a main address that doesn’t really change that you accept connections on. Firewall that for ports you want to allow and then hackers need to port scan 2^64 or 2^80 address space to find your real IPs in your prefix. If they capture your IP from a connection to a web server etc, they won’t have luck scanning you.

    Again as per my post above, the biggest risk right now is bad default configurations on many home routers.