You pretty clearly don’t know what a call to action is, or an ad is, because “please give money” is very obviously a call to action, and many ads make no effort whatsoever to sell any product.
You pretty clearly don’t know what a call to action is, or an ad is, because “please give money” is very obviously a call to action, and many ads make no effort whatsoever to sell any product.
Yes. It is literally impossible for an organization asking for money not to be an ad.
And yes, showing me a single ad once means I never give them money again. I am not OK with ads.
Yes, it is an ad. Any call to action is an ad.
And its mere presence will ensure I don’t give them any more money. The core concept of inserting any ad in an OS is not behavior I am willing to reward.
It’s not complicated.
It’s an ad.
There’s no version of advertising I will ever be OK with.
It’s implemented as a KDE Daemon (KDED) module, which allows users and distributors to permanently disable it if they like.
Eh. I guess good enough.
But I’m still opposed on principle.
Wall of text?
I answered a suggestion with very clear preferences that something not use a trainwreck of a directory structure and you pointed me to a post on how to make a trainwreck of a directory structure, so I wrote a short paragraph again clarifying that I’m not OK with that.
I don’t want anything automated. I just want to be able to do it manually with a database that handles all of the metadata and organization and literally no folders but the top level one containing every file. Calibre’s insistence on me either having incorrect author information or splitting everything with multiple authors into unique folders for every combination is most of the reason I can’t stand it. The actual bulk editing tools are good. The end result of a mess of folders isn’t.
I’m not OK with folders, especially nested folders.
I’m aware of it and explored it a little, but the folder structure requirements are the opposite of what I’m interested in. I want to dump everything in one place and use the UX of my reader to manually build series, adjust metadata, and do everything else.
Most of the benefits of it are really only useful in its browser based reader, which is also a dealbreaker, and it doesn’t really add anything to Moon Reader because OPDS integration doesn’t actually sync anything, which is the whole reason I’d want a dedicated server over just having everything in a cloud drive.
It’s cool if it works for you, but it doesn’t really solve any of the problems I want solved.
Yeah, I’ve tried, both for actual files and for tracking my reading across multiple platforms, and nothing really seems to fit my needs, especially when I want to actually read them on an Android ereader. Anything I choose seems to have a lot of manual effort, frequently, or just a dumpster fire of an actual reading experience.
I feel like I’m eventually going to have to make my own, which is fine, I guess, but I’m definitely not comfortable actually managing a community project or just building up the codebase or documentation to the level someone else would be enthusiastic to use as a jumping off point to manage themselves, so it will probably just stay a personal project that ends up not helping anyone else solve the same problems I have.
You should be able to set it up, which seems to be the crux of your question.
The reason for the conflict is likely that the traffic is encrypted through the tunnel, but cloudflare holds the certificates needed to verify the identity of your site and can see all the traffic.
But tunnels are done by having your server initiate the connection with cloudflare, so it behaves like a client in terms of networking, and it should work in most cases.
(Worth noting that video was against their policies for using at least the free tunnels last I was aware, so if that’s part of your use case you might not be able to use it.)
Donations.
Presumably because either the authors or intended visitors (those who value privacy) prefer a slightly more work to track transaction.
Leaked how? No good practice allows any way for a password to “leak”.
What rotating passwords does is ensure people who don’t use a password manager either write their password down more and more frequently, or use a weaker password with some simple changing pattern that doesn’t add anything.
Changing passwords is almost always completely useless, and requiring it dramatically weakens security.
My guess is that it doesn’t do much that you don’t specifically tell it to, so you have to manually configure printing at some point.
Value is absolutely not arbitrary.
“Reasonable” means comparable with x86/ARM at the same performance level. Anything more is, by definition, not capable of being reasonably priced.
You’re again advocating for an imaginary investment in a bad product.
My interpretation was by far the most generous to your position, because it’s the only way it’s coherent.
If people bought [this hardware that doesn’t actually provide anything anyone can realistically use at a reasonable price] it might eventually not suck. That’s treating a current purchase as an imaginary investment in maybe eventually being able to buy something useful.
What are you talking about perfection?
Buying something that doesn’t function is never rational.
You’re responding to a post about exploiting kernel level anticheat and saying it would only be a targeted attack, despite that inherently not making sense. When you find a vulnerability in that software, there is absolutely no reason not to spread it en masse. The cost to infect one person is the same as the cost to affect tens of thousands or more. The game is both the vulnerability and the distribution method.
Gamers aren’t more valuable. They’re more accessible. Because there isn’t a kernel rootkit “anticheat” developer on the planet who gives two shits about security in any context, and there are a massive number of systems that their insane hacky bullshit touches. Every single one of them has their security automatically compromised. The goal isn’t just information. You’re getting a massive, distributed, residential IP botnet that you can’t lose unless they throw their systems in the trash.
For what reason?
Kernel level game anticheats are a great attack vector, and it’s one that inherently identifies and enables distribution to other vulnerable targets. It’s begging to self replicate.
Industrial espionage does not make sense, because most enterprises have, even if imperfect, restrictions on what can be installed on company computers that contain valuable information. You’re not going to get a game with kernel malware on a managed enterprise computer.
I’m not downvoting, but the fact that kernel malware games don’t work is a feature to me. It would be a full time job to keep from installing anything that demands obscene access for no legitimate reason on Windows. “It doesn’t work” is way easier.
Pretty much everything else on Steam works without effort.