• 0 Posts
  • 10 Comments
Joined 1 year ago
cake
Cake day: June 1st, 2023

help-circle
  • PDF is a complicated format, and the hacking vectors are often thanks to embedded javascript, or vulnerabilities in the parsing libraries.

    ‘avi’ is technically a container format, kind of like ‘zip’, it can contain more than video/audio.

    That said, I’ve been pirating movies since the mid 1990’s and haven’t gotten hacked through a .avi/.mkv/etc. The ‘bad stuff’ was always in a obvious .exe/.bat or some sort of executable, but sometimes named to exploit people, eg ‘foomovie.avi.exe’.

    If in doubt, run your videos using mplayer on Linux and not on Windows, most of that stuff tends to target the easier to exploit and more commonly deployed systems, eg Windows.






  • miahtomainThank you all for your patience!
    link
    fedilink
    English
    arrow-up
    10
    ·
    1 year ago

    Thanks for hosting the server. Scaling while being slammed is tough! I’ve noticed a few times the server is too loaded and try to come back later. With reddit down you’re essentially feeling ‘the slashdot effect’ (is that still a thing? lol). I’ll keep coming back and checking =)

    I’ve done infra/ops for years, and been in your situation more than once. Take your time, you’ll get it all sorted out. John Allspaw wrote a good book about this subject, “The Art of Capacity Planning: Scaling Web Resources”. There is a new edition out that I haven’t read, but all of the lessons learned in that book are still applicable today. The biggest thing that helped me was learning haproxy and figuring out how to spread out the load, minimize response times, as well as queue time.




  • miahtomain*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    6
    ·
    1 year ago

    Deleted my 13 year old account this morning as well. I’m sure the executives all have golden parachutes, so it doesn’t matter if or when they fail. But they will fail.


  • miahtoChatHow is everyone doing today?
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    1 year ago

    Another way to think about it is through Graph Theory / Connectivity. https://en.wikipedia.org/wiki/Connectivity_(graph_theory)

    In a federated network, what you see depends on your connections, similarly, what others see depends on their connections. Lemmy/Fediverse operators can defederate with nodes that are ‘bad actors’ (however their moderation team / operators define that), eventually the defederated node may not see much or be able to interact with much because of the limits of their connectivity.

    Graph theory / connectivity is also how social networks figure out who you might be friends with, and how the NSA figures out who might be bad apples.

    Math is cool =)


  • miahtomainNew midwest.social users look here
    link
    fedilink
    arrow-up
    22
    ·
    1 year ago

    Sup nerds. I’m Miah, I’m from Western Michigan. I’m a UNIX/Linux nerd, Right to Repair advocate, and transgender woman. I’ve been working on our cars by myself and would love to make some car nerd friends. My wife and I have 24 chickens, and a budding garden.