• 0 Posts
  • 5 Comments
Joined 1 year ago
cake
Cake day: October 17th, 2023

help-circle
  • Hope this is the right place to ask. I used some free software in the past to catalogue some ripped DVDs and I can’t remember the name of it. All I have to go on is thenaming format of the folder:

    Unstoppable (2010) [DVD] [PG-13] [voted 6.5] [Action-Adventure]

    …and in that folder, the software downloaded images etc.

    Thank you in advance!

    I suppose putting that kind of information into the filename can be advantageous in some scenarios, but I really wouldn’t advise it, u/Zestyclose_Key_6964. That’s the whole point of having metadata!
    Overly long filenames can also cause problems for Windows-based programs that use the Explorer (including the Explorer itself) as there is an inexplicable total limit of 255 characters for filepaths. After the things will get buggy.


  • For now my server doesn’t have very important data most of it are your “Linux isos” I can just download again and I’m thinking of starting to move my file and photos to the server but in afraid. What if I get a ransomwarei don’t realize and all my backups get encrypted too? Or if the backups are corrupted and my disks breaks? But also I’m afraid about cloud because I’ve seen some posts about people getting their google accounts closed without notice for breaking TOS (maybe they did something wrong maybe not).

    What you’re describing sounds like general anxiety. So if you’re asking whether I’m suffering from anxiety, then no :P There are risks in life and precautions you can take against them. I’m just as “scared” about losing data as I am about getting run over by a car, that is to say not at all. Both scenarios are horrible, both can be reduced in risk by employing reasonable countermeasures and behaviors. Beyond that it’s out of my control so there’s no point in worrying.

    The only hazy variable in this kind of contemplation is: Am I knowledgeable enough to properly gauge the risks and know the “reasonable countermeasures”? And if you’re asking “Do you know enough?” or “Do you spend enough time learning new things?” then my answer would always be an emphatic “No!” because there’s no such thing as enough knowledge and competence.


  • I don’t know if this is the right place to ask for these kind of things but here we go.

    I have been cheating in public Minecraft servers (you can judge me), and every time I get IP banned (about once an hour), I restart my modem so it changes my PC’s IP (I think it’s called dynamic IP, correct me if I’m wrong).

    So, the thing I’m worried about is: Is there a chance for me to run out of IPs I get banned in all of them? Is the amount of IPs that I can change limited? If it is technically I can get banned in all of them, right?

    Sure. But the bigger “danger” to you here is getting thwarted by something more sensible than IP-banning like HWID-banning, which isn’t something you’ll feasibly be able to circumvent.

    Do keep in mind that, depending on how seriously the admins on the receiving end take their jobs, continuous nefarious and undesirable activity from IP ranges is routinely tracked and reported. That chiefly concerns typical botnet activities like DDOS and spam but certainly isn’t limited to that. Less bandwidth-intensive but still undesirable behaviors like fraud, unauthorized to foreign systems and even video game cheating are still going to incur a risk of affecting your digital life and future. How freely one is able to use online services depends on the their repute. That’s the reason why, when using a Tor exit node, you may have to suddenly solve 6 consecutive CAPTCHAs when signing up for a random service while also not being able to use other services at all, e.g. banking access.

    Don’t be smelly like a Tor access node u/HighZein.


  • Should I use FTP or SFTP when downloading files to a PC from a Seedbox?

    What is safest when not using a VPN?

    Do not use unencrypted connections. There is no reason to ever use an unencrypted connection. FTP is obsolete, it was used in a time when encrypting and decrypting data was too resource intensive for the processors available.
    That time has long since passed. People have been born, have grown into adults and have had children of their own since then.
    Don’t use ftp, don’t use http.