In case you’re interested in (co-)moderating any of the communities that I created, you’re welcome to message me.
I also have the account @Novocirab@jlai.lu. Furthermore, I own the account @daswetter@feddit.org, which I hope to make a small bot out of in the future.
ffmpeg is usually the tool of choice.
An example for batch converting of all AVI videos in a folder:
for i in *.avi; do ffmpeg -i "$i" "${i%.*}.mp4"; done
Source & further reading here on StackOverflow. The comments to the answer provide examples of how to explicitly tweak the quality level. Inverting what this specific comment suggests, conversion from H264 to H265 could be done by something like this, assuming all your videos’ names end on .mkv
:
for f in *.mkv; do ffmpeg -i "$f" -map 0 -movflags faststart -c:v libx265 -c:a copy -c:s copy "${f/x264/x265}"; done
I wonder: if one wants to make things run in parallel, would that be as easy as adding " & "
before the last semicolon here? I suspect this could work as long as there are only a few handful of files, but lead to troubles once there’s more.
I think we should be reposting Rosie stuff way more often. https://www.youtube.com/watch?v=64YhFQ99a-c
Like I said: it can be gamed to some degree, but what system can’t?
Besides finding better ways to positively recognize bots, we also need to invent ways that make it quicker to realize “false alarm, this user is actually legit”.
For example, users should have an option to pin posts and comments to their profile, and I suggest to provide at least two different ‘tabs’ for this in the public profile: One tab just for the usual “posts and comments you would like the world to see”, but another tab for “some recent, complex interactions between you and other (established) users that in your eyes prove quite well you’re not a bot”. The purpose is simply to save others, worried that you could be a bot, some time of going through your posts in search of signs for humanity. Yes, this can be gamed to some degree (what can’t?). However, at a technical level, the feature is little more than a copy of the “pin” feature that would be very nice to have anyways, so we can get an appreciable improvement in our ability to tell users from bots for very little programming effort.
It was a bit of a long shot experiment to begin with. The commands I posted can be useful when an audio device suddenly stops working after it has been working initially during a session, but since your problem is most likely about your device not being recognized at any time, it’s not too surprising that they don’t do much. Just worth the try.
Do any of
alsactl clean 0
alsactl clean 1
alsactl clean 2
do anything for you? (The numbers are for sound card 0, 1, and 2. It looks like, if anything, only 0 would be relevant for you, but you can try the others just in case.)
This command cleans the controls created by applications.
https://manpages.ubuntu.com/manpages/questing/man1/alsactl.1.html
Came here to point to this.
Also, if outside noise is preventing one from keeping the windows open over night, get custom-fitted silicone earplugs.
This is in all likelihood the way to go. These instructions from VeraCrypt might lead the way.
Of course, OP should create an exact duplicate of the disk to another drive before making any changes to it.
As an aside, I know that GPT partition tables likewise come with a backup header at the end of the disk. Whether LUKS encrypted devices also have backup headers, I don’t know, but it doesn’t seem so. So, my fellow LUKS users, perhaps you would like to run the following:
sudo cryptsetup luksHeaderBackup /dev/LUKSDEVICE --header-backup-file ~/nas/backups/lenovo_x280.luks.bin
I think a better title would be “Gnome is Asking You to Switch from Lump Sum Donations to Regular Donations, Even If the Total Amount is Smaller”
Love it. Under text editors, would you like to add Helix? It’s much like (n)vim, but among many other aspects it has better discoverability of features (although several key features like plugins and code folding are still missing).
There are word filters for Lemmy?
lmgtfy always was needlessly unfriendly, but in the age of search result enshittification, it’s even lost the excuse of technically providing a good solution (at least in cases like this).
Creating a live USB with persistence is lengthy and even the decent tutorials out there vary greatly in their suggested approach, making it perfectly legitimate (even for non-beginners) to ask for guides that others have found helpful.
What a needlessly unfriendly response.
In case anyone wonders about the context, this is the paragraph:
In April, Palantir co-founder Joe Lonsdale got into a brawl with former Coinbase chief technology officer and Network State advocate Balaji Srinivasan. It wasn’t on a prominent stage or even Twitter/X; it happened in a Signal group chat that’s become a virtual gathering place for influential tech figures. Srinivasan wasn’t going along with the tech right’s aggressive anti-China rhetoric, so Lonsdale accused him of “insane CCP thinking.” “Not sure what leaders hang out w you in Singapore but on this you have been taken over by a crazy China mind virus,” he wrote.
Oddly enough, this guy Wolfram Weimer is a die-hard right-winger. So I was quite flabbergasted when I first read the headline, and still am doubting whether he really intends to follow through with this or rather is only floating this idea in order to introduce another bargaining chip in the trade negotiations with Trump.
Thanks. Makes sense that things roughly along those lines already exist, of course. CrowdSec’s pricing, which apparently start at 900$/months, seem forbiddingly expensive for most small-to-medium projects, though. Do you or does anyone else know a similar solution for small or even nonexistent budgets? (Personally I’m not running any servers or projects right now, but may do so in the future.)
There should be a federated system for blocking IP ranges that other server operators within a chain of trust have already identified as belonging to crawlers. A bit like fediseer.com, but possibly more decentralized.
(Here’s another advantage of Markov chain maze generators like Nepenthes: Even when crawlers recognize that they have been served garbage and they delete it, one still has obtained highly reliable evidence that the requesting IPs are crawlers.)
Also, whenever one is only partially confident in a classification of an IP range as a crawler, instead of blocking it outright one can serve proof-of-works tasks (à la Anubis) with a complexity proportional to that confidence. This could also be useful in order to keep crawlers somewhat in the dark about whether they’ve been put on a blacklist.
I have little knowledge of Romanian politics, but it does seem that in this presidential race, Nicușor Dan does have some serious track record from his time as mayor of Bucharest.
For an ongoing discusion on Lemmy and a more detailed article see here