• 0 Posts
  • 24 Comments
Joined 1 year ago
cake
Cake day: August 19th, 2023

help-circle

  • Depends on ISP.

    If IPv4 ban, it is indeed 100% ineffective. Nearly all ISPs either CGNAT or rotate addresses. If IPv6, the ISP just forwards a 64 bit block and leaves it at that. You must call and request a new IP block. In which case you’ll be told yes or no. If yes, it’s either free or paid.

    I know with ATT Fiber, they don’t offer address changes unless there is some security or service interruption reason. You have to unplug the modem for 30+ days so the lease expires if you don’t want to do rounds with support. My IPv4 address has changed once, but my IPv6 address block has never changed.




  • Skin is an elastic organ. If you start putting on fat, your skin stretches. The foreskin can be stretched with regular motion. Retracting it on a daily basis would encourage it to stretch. Infections occur only when the foreskin isn’t cleaned well. I don’t know your circumstances personally. Teaching you how to keep clean and retracting the skin is a viable method. I’m not discrediting your parents. Just sharing the logic behind why circumcision is not absolutely necessary or should be the first choice. If this was the informed decision they made for you, I’m glad it was successful with no complications. That’s the best possible outcome.


  • When a baby is born, the doctor may ask if you’d like to have your baby circumcised. If this is the case, it happens before they leave the hospital. This is where that time frame comes in. Otherwise, circumcision is “recommended” within the first two weeks after birth.

    Here is a medical reason at birth: https://www.cdc.gov/ncbddd/birthdefects/hypospadias.html

    Any medical condition after birth that requires a circumcision, needs to be performed by a doctor who knows exactly what they’re doing. Not every doctor does. So you end up with not-so-great stories shared around.

    Edit: You describe the tight foreskin you experienced which is in the second link I provided. It is a medical condition that doesn’t require circumcision. In fact, you could still have your foreskin right now. The condition usually goes away over time. Believe it or not. Circumcision is an easy way out. But one that may cost. And in the case of that individual, it did.


  • Oh boy. You’re about to learn a lot.

    A circumcision isn’t necessary when there’s nothing medically wrong with you. It’s literally mutilation when it’s done for religious or appearance reasons. Spoiler! These are the two most common reasons why this procedure takes place. You didn’t consent.

    When you’re born, the foreskin is fused to the glans (penis head). A foreskin’s purpose is protecting the glans and keeping it moist. A circumcised penis is scientifically proven to have reduced sensitivity because the glans are exposed all the time.

    This procedure usually happens when the baby is 24 to 48 hours old. There are over ~100 deaths a year from circumcision. If an infection occurs, this can easily get out of hand and cause the loss of all or parts of the penis… on a new born baby mind you. Complications later in life may include, but not limited to: pain or discomfort with an erection, erectile dysfunction, or abnormal shape or size of an erection.

    Because a new born penis is incredibly small, the slightest mistake can lead to disaster. In some cases, can mentally fuck someone up. Unfortunately, I am personally affected by a botched procedure. Too much skin was taken off and the urethral opening was torn.

    It’s an unnecessary procedure that can fuck up your otherwise healthy at birth child for the rest of their life. All for some religious reason or because parents “don’t like it” - every male is born with it. It’s there for a reason.



  • It’s not odd at all. It’s well known this is actually the truth. Ask any video editor in the professional field. You can search the Internet yourself. Better yet, do a test run with ffmpeg, the software that does encoding and decoding. It’s available to download by anyone as it’s open source.

    Hardware accelerated processing is faster because it takes shortcuts. It’s handled by the dedicated hardware found in GPUs. By default, there are parameters out of your control that you cannot change allowing hardware accelerated video to be faster. These are defined at the firmware level of the GPU. This comes at the cost of quality and file size (larger) for faster processing and less power consumption. If quality is your concern, you never use a GPU. No matter which one you use (AMD AMF, Intel QSV or Nvidia NVENC/DEC/CUDA), you’re going to end up with a video that appears more blocky or grainy at the same bitrate. These are called “artifacts” and make videos look bad.

    Software processing uses the CPU entirely. You have granular control over the entire process. There are preset parameters programmed if you don’t define them, but every single one of them can be overridden. Because it’s inherently limited by the power of your CPU, it’s slower and consumes more power.

    I can go a lot more in depth but I’m choosing to stop here because this can comment can get absurdly long.




  • You always will. Welcome to the Internet. The difference is whether or not you’ve taken steps to secure your stuff. You need to understand what this malware is looking for. It’s explicitly looking for unsecured services. Such as WordPress, SQL, etc. There are inexperienced users out there that inadvertently expose themselves. I see this type of probing at work and at home. Don’t overly stress it. My home server has been running for a decade without issues. Just keep it updated and read before you make any changes if you don’t fully understand the implications.

    My home based server is behind a pfsense firewall. Runs Arch. Everything is in a non-root docker container. SELinux is enforced. All domains are routed through Cloudflare. Some use Cloudflare Zero Trust.


  • Oh my. You’re doing it wrong. Exposing the unencrypted connection without the proper security measures is putting yourself at risk. Regardless of how strong you set the password, the connection can still be abused in all manner of ways. If you read the jellyfin documentation, you’d see the developers clearly state you should never do this. You need to put Jellyfin behind server software. Specifically a reverse proxy. I use NGINX. You can setup your connection to be secure this way. You can now also use Cloudflare if you have cache turned off. And if you really wanna go the extra mile, route it behind a VPN. Though this makes it harder for those you share it with or some devices that don’t support VPN.

    Please revise your connection. If you need help, feel free to reach out.



  • Jellyfin gives you 100% control. You’re responsible for setting up remote access. Which actually isn’t that hard. Several IT and network admins of the community (myself included) hand out documentation on how to do this. Without completely ruining your security.

    With Plex, some of the application communication is routed through their network. It requires an active internet connection and you must create an account with them. They have third party analytics embedded, use tracking pixels, beacons and device fingerprinting. Whatever personal data you have supplied is used to serve ads. This being their promoted content that isn’t part of your library.



  • Eh. Adobe puts more effort into making it harder or tedious.

    With the introduction of Creative Cloud, the notorious “amtlib.dll” that houses Adobe licensing, was bundled into the respective applications binary (exe). It didn’t stop pirates. In 24 hours they found the licensing mechanism and patched it.

    You could create a CC account, install the desktop manager, install any app(s) you wanted, then crack them. When an update arrived, you could simply update the app(s) and apply the crack again.

    Occasionally the licensing mechanism would update and an updated crack would be needed. As usual, pirates had this worked out the day of or a day later.

    Adobe would later patch the desktop manager and break functionality to update software if it wasn’t genuine. People could still get the latest versions by uninstalling and reinstalling through the desktop manager. Since it would retain user settings by default.

    Later, a mechanism was built into each application that would throw a warning message that the application isn’t genuine. For example, Photoshop would soft lock and the genuine check would display with the only option to close. This too was eventually patched out by pirates.

    The latest attempt from Adobe now forces users to input and have a credit or debit card saved before activating a trial. This removed the ability for users to easily install software anonymously.