![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.dbzer0.com/pictrs/image/a18b0c69-23c9-4b2a-b8e0-3aca0172390d.png)
Ah, that makes sense. I was thinking more like a mini-m&m tube.
I blow hot air.
Ah, that makes sense. I was thinking more like a mini-m&m tube.
I’m having a hard time envisioning the flexibility required to make that work. It couldn’t have been both at the ends at the same time? Also, did this kid just get naked in front of everyone at their party? To each their own, I guess.
If you want a decentralized search, set up a DHT crawler and build a db of millions of torrents in a week or two. If you want anonymity/legal protection, use a trusted VPN. I’m not sure I’d trust a random independent tor-like implementation, especially when the real tor is slow and has imperfect anonymity.
Plenty of comments hurt my brain trying to comprehend how utterly stupid they are, but I don’t think there’s anything an anonymous stranger could say that would hurt my feelings, that kinda stuff needs to be personal.
All these answers read like they’re written for comp sci students rather than a general audience. Let me give an ELI5 (more like ELI12) a shot.
Ports are just numbers. They aren’t physical pathways or doors or windows or anything like that. A better analogy is a street address, like an apartment number. Your IP address identifies your computer (apartment building), and the port identifies the program on the computer (the apartment). When a program needs to talk to the internet, which is very similar to sending a letter, it hands a packet/letter to your computer and your computer assigns the program a port number. It then puts that number on the return address of the letter so that the recipient knows where to send the response. The computer remembers that port number is associated with that program, so when it gets an incoming letter with that number, it gives it to the program. After the program is done talking to the internet, the computer frees the port up to be used by another program.
Ports are “closed” when there is no program associated with them. Any incoming letters are ignored because they have nowhere to go.
Ports are “open” when they’re associated with a program. This happens automatically when programs send outgoing letters, or you can manually open (or “forward”) ports by telling your computer/router what the port should be associated with and that it shouldn’t use the port for something else.
ELI5 over.
The internet is networks on top of networks on top of networks, so your computer will have an IP and assign a port number, then your router will remember that and change the address on the letter to its own IP with a different port number, then that process repeats a few more times until eventually it reaches its destination. You don’t have to deal much with your computer’s internal network, but occasionally you have to deal with your router’s by opening/forwarding a port because it has a NAT that has to deal with all of the devices on your network. Forwarding the port just tells your router to always send incoming letters with that port number to a specific device.
Podman is purposefully built to rely on systemd for running containers at startup. It ties in with the daemonless and rootless conventions. It’s also nice because systemd is already highly integrated with the rest of the OS, so doing things like making a container start up after a drive is mounted is trivial.
Podman has a command to generate systemd files for your containers, which you can then use immediately or make some minor tweaks to your liking.
I use podman for my homelab and enjoy it. I like the extra security and that it relies on standard linux systems like systemd and user permissions. It forces me to learn more about linux and things that apply to more than just podman. You can avoid a lot of trouble by running the containers as root and using network=host, but that takes away security and the fun of learning.
The Mac Pro only costs three times as much as a cheese grater???
Top tier local image compression. Highly configurable. No installation required.
You still get this effect if you are active on specific communities, especially smaller ones.
Vulnerability is frightening and challenging, but it’s also a crucial part of human connection that can be very liberating. It can be really helpful to acknowledge the need to be vulnerable and to realize the hurdles to it and the benefits of it.
Here is a super popular Ted talk on vulnerability that just about everyone could benefit from watching: The power of vulnerability | Brené Brown
This isn’t the study I was referring to, but it’s more recent and came to the same conclusion: https://news.stanford.edu/2022/09/08/asking-help-hard-people-want-help-realize/
There was a study a few years ago that found that asking someone for help actually strengthens your relationship and makes them like you more. IIRC it was on workplace interactions. The basic idea being that if you ask someone for help, it shows you have trust and confidence in them and they get to feel useful, which people generally enjoy.
Obviously that’s going to depend on the type of help. If I need help moving or with some mental issue, that’s going to be a more appreciated ask than if I ask for money. Not that asking for money is always a bad thing, so long as it’s a legitimate need and doesn’t become a habit I think most people would be happy to help out a friend low on cash. It’s better to get financial help from friends and family than from some predatory payday loan that is designed to keep you in debt for the rest of your life.
They like cameras