• 4 Posts
  • 24 Comments
Joined 1 year ago
cake
Cake day: July 22nd, 2023

help-circle


  • Specifically, it refers to a deep understanding.

    [A critic] notes that [the coiner’s] first intensional definition is simply “to drink”, but that this is only a metaphor “much as English ‘I see’ often means the same as ‘I understand’”. (from Wikipedia)

    When you claim to “grok” some knowledge or technique, you are asserting that you have not merely learned it in a detached instrumental way but that it has become part of you, part of your identity. For example, to say that you “know” Lisp is simply to assert that you can code in it if necessary – but to say you “grok” Lisp is to claim that you have deeply entered the world-view and spirit of the language, with the implication that it has transformed your view of programming. Contrast zen, which is a similar supernatural understanding experienced as a single brief flash. (The Jargon File; also quoted on Wikipedia)






  • Lots of good answers here but I’ll toss in my own “figure out what you need” experience from my first firewall funtime. (Disclaimer: I used nftables – it should be similar to ufw in terms of defaults though).

    • Right off the bat, everything unneeded was blocked. I “needed” no configuration, except for maybe…
    • Whatever CUPS runs on (when I use it)
    • Sometimes I ran python -m http.server – I unblocked port 8000 for personal use.
    • I chose to unblock port 53 (DNS). I wanted to connect to another computer via hostname IIRC (e.g. connecting to raspberry-pi.local. I might be misremembering this though).
    • At one point I played with NGINX – that’s port 80 (HTTP) and port 443 (HTTPS).
    • SSH was already permitted (port 22 – you need root access to enable traffic through ports below 1024 anyway so this wasn’t an issue for running typical apps)

    I didn’t use WireShark back then, really. I think I just ran something like

    sudo lsof -nP -iTCP -sTCP:LISTEN
    

    which showed me a bunch of port traffic (mostly just harmless language servers).

    You don’t have to dive to deep into all the “egress” and “ingress” and whatnot unless you’re doing something special. Or your software uses a weird port. (LocalSend lol)


  • You prevent them from waking up earlier, huh? Youngsters definitely have infinite energy at the odder times. I sure did my fair share of waking up early to increase the fraction of the day I gamed for.

    This is a pretty convincing stance in favor of timers, actually. The idea of transferring video-watching from the iPad to the television is a friendly way to prevent an unchecked iPad-kid situation. My opinion shifted a little. :P

    Do you have timers on the iPad for any mobile games, or just YouTube?


  • Your stance on the age-inappropriate reminds me of what @southsamurai commented! I’ve definitely seen a lot of “Don’t protect your child too hard by concealing the inappropriate from them” lately. I wonder how many modern parents are shifting to that ideal.

    “Kids respond well to being treated seriously.” (from Vox, “Why safe playgrounds aren’t great for kids”, 3:17)

    You mention that there are some cases where parental controls would help, but you also mentioned that, (1) regarding inapproriacy, you shouldn’t baby children and (2) regarding screen time, BananaKing’s take is the best route. Doesn’t that cover both aspects of where parental controls would be used? What cases would you say parental controls would help with?


  • Someone downvoted but I want to hear your differing stance so I upvoted. (Come on fellow lemmings ` . ` let’s melting-pot a little!)

    Anyway – your belief is interesting, though I feel like I might disagree! Seems similar to @Contramuffin’s upbringing, but more extreme.

    How would you train them beforehand? Or would you just drop them into the archetypal sink-or-swim? Don’t you think the kid would feel lonely, say, if they stumbled on a jumpscare video and got the heebie-jeebies but you didn’t help? Everyone makes mistakes. And outside of scarring – what if your kid turns into one of those YouTube Kids jockeys?

    Is your hypothetical “Tough shit, deal with it and get stronger” approach similar to how you were raised?




  • Someone downvoted you but I’d like to hear differing opinions, so I upvoted.

    By teaching the child how to circumvent these measures, what do you mean by that? Do you teach them to break your router rules? And when would you do that – when they appear mature enough to you? Of course, there’s the chance that they don’t like tech.

    Imaginarily, my kid and I could have some arms-race fun, but I don’t know how realistic that is.


  • Hah! Faraday Cage, nice. Location spoofs too!

    Interestingly, the route my mother took was, when I went off to college, she asked me if she could track me. We discussed privacy (who has my location?) and security (Is the protection endeavor proportionate to the threat chance?), and I demonstrated a basic location spoof (I am in control of my data).

    In the end, we agreed to allow some monitoring.

    That’s different of course – it’s a rare (I think) circumstance and consent, and isn’t quite parental control, as both parties had equal grounds to form said consent.

    I wonder if such a conversation could happen among younger children. 12 to 13 y/os maybe? Depends of course.




  • Oh I love the “walk me through what I’m about to do” concept. Dry runs should be more common – especially in shell scripts…

    The world would be a better place if every install.sh had a --help, some nice printf’s saying “Moving this here” / “Overwrite? [Y/N]”, and perhaps even a shoehorned-in set -x.

    Hope your r/w wasn’t eaten up by the subfolder incident (that I presume happened) :P


  • I think I disagree with a lot of the comments here. The “trying to sound smart” feeling only really occurs when there’s a mismatch in decorum – someone is trying to appear Higher and More Logical – but that can happen with any word, especially adverbs.

    Technically, your argument is fallacious.

    “Technically” is a useless crutch word (techy!), and “fallacious” is hella overused outside of formal logic stuff, so here it’s a mismatch in decorum. (What’s the fallacy? Does the other just… disagree with you, or are you using a converse error like A implies B, therefore B implies A?)

    Well, you don’t always have to do that, per se, but you can irregardless.

    A lot of crutch words are just innocent habits, too. [email protected] mentioned something like that… though there are always people who up their jargon levels for no reason other than To Be More L33t. and_screw_irregardless

    On the other hand, some words commented here are needed. For example, if a reviewer calls Grossman’s The Magicians “erudite”, it fits perfectly – the book

    Tap for spoiler

    uses a metaphor for an archetypal Harvard. In one word we sum up the cloistered, elite, difficult, rich, status-chasing-ness combined with sophistication the metaphor entails.

    Continuing on that feeling of summed-up-in-one-word-ness – what alternatives do we really have for “whataboutism” or the “algorithm” or “milquetoast”? Those words hit hard, they sum things up.

    The algorithm is an alt-right pipeline, of course he’ll have that phase.

    Great, another video on the most milquetoast youtuber drama I’ve ever heard.

    Those words are concise, they roll off the tongue and evoke feeling! Don’t shorten words just to sound more colloquial when you have a choice that really fits! And likewise, equally – don’t be grandiloquent just for the sake of it.

    Or else you’ll face floccinaucinihilipilification :3



  • Hah, stochastic parrots.

    Makes me wonder. Every laziness I’ve had with the vector guessers, I’ve seen an exact counterweight.

    matrix scrombulator webpage (2007-2014)
    Here’s random code. Pray it works Free ancient code at man 3 getifaddrs.
    How does this API work? (when the API has below 10 million sample lines of code) Incredibly concise documentation worth spending 2 minutes on or HTML text without margin lines worth spending 20 minutes on
    Maybe this is what’s causing your bug. Investigate a, b, and c. Conclusion sentence. footnote in ArchWiki / archetypal 2009 StackOverflow duplicate
    Here’s the main idea of X… you need to take into account a combination of facets to ensure safety. Angry blog post about X that’s oddly technical (now you see both sides)

    One, you can invoke more often (throw ChatGPT configs against the wall until it doesn’t error); the other you can invoke more deeply. So I can’t help but wonder – when we cancel out all the terms – if the timesaving sum is positive or negative. ¯\_(ツ)_/¯



  • Yeah, it’s pretty funny how distros just passed each other by like that. Back then it was Debian that was regarded as the hyper-poweruser distro:

    The reason I havn’t used Debian is because I can’t install it. “This guy is totally clueless” you might think. My only response is that I’m writing this on a Gentoo box that I have installed myself.

    And then now there are plenty of people reading this thread who liked Windows 7. As time passed, their grade on the ease-of-use of A passed the don’t-get-in-my-way of B, and a load of Windows 10ers jumped ship to Linus & Friends, the last place their Windows 7 selves would have expected to go. Always a reminder that the end of history isn’t now.