tech
Discord ID: 352761432833523713
1,350 total messages. Viewing 250 per page.
Prev |
Page 6/6
80 plus ratings for PSUs tell you how wasteful/efficient they are. 80 plus bronze is a basic, good level of efficiency, but I would aim for gold.
If you can give your PSU some headroom that's good for efficiency. For instance, with your PC chugging along at 100% CPU/GPU processing power and only pulling 80% of the PSU capacity. This website is a good resource for estimating usage https://outervision.com/power-supply-calculator
Get an **NVMe** SSD in M.2 form factor, at least 256GB, for your installation of Windows (or Linux?). Samsung and Intel make good ones. You probably won't need the Samsung Pro series. Evo is fine. Do NOT forget to install the drivers from them, you don't want to miss out on the full speed potential.
Spinning disk storage is cheap, you should be able to get a 4TB 3.5" hard drive for less than $90
Keep all your legally backed up blu-ray movies on there.
When I was last working, the GeForce GTX 1060 was the best value in graphics cards. They have since replaced the 1070/1080 with 2070/2080 upgrades and I'd be surprised if they didn't roll out the rest in the next couple months.
I can't speak for AMD/ATI Radeon graphics cards because they have such small market share I never got to mess with them much. There's bound to be somebody who knows more and can tell you how they are competitive with Nvidia GeForce cards...
Also, avoid craigslist PCs. Everyone on there tries to advertise their old PCs as great gaming rigs. They're usually overpriced and very outdated.
<@&435155896780324864> How does my schedule look this quarter?
@Jacob all fundamental topics. Learn them well!
I'll try! ๐ณ
I definitely wanna go SSD, willing to pay for it.
@Mick $500-$1500 is an enormous budget range. $500 would be a very budget desktop, not doing more than basic gaming. $1,500 would be a beast that would shred everything on max settings.
As far as AMD graphics cards, only cards worth it from them right now are 580 and maybe 590. The Vega cards are power hungry and overpriced unless you get them with a blower cooler, which you probably don't want.
Personally, I just upgraded my PC this Black Friday. I went with an AMD Ryzen 5 2600X and an EVGA GTX 1070 as far as CPU and GPU. I felt those were the best value, but that 1070 was heavily discounted and had a rebate. I would not pay full price for it, but at the price I paid, it was a great deal. Personally, I wouldn't pay above the low 300s for a GPU.
Anyone @here have experience with running Google ads on their website?
<@&435155896780324864> can someone explain to me what entry level programmers do?
you mean like dig through hundreds of lines of code and look for the part where they accidently put an "1" instead of an "i"?
@Jacob Yup, and hopefully eventually learn to leverage CTRL+F to do it faster.
In my case, the fixing meant deleting and redesigning an entire website.
Because the old one was too sickening to tolerate.
๐ณ
is it stressful work?
Depends. Where I work is fairly laid back. Depends how fast paced the business is.
I hate fast paced work, so I'm happy where I am.
I've just been in college so long that I want something low stress when I'm out
I am a digital marketing pro let me know if you need help with website or ads or anything
@Gumbo - AZ Thanks but it was a technical issue with adding Google ads. I settled on not using them because they're disgusting.
Np just here if you guys need anything
<@&435155896780324864> anyone here know SQL?
@Jacob yes `DROP TABLE IF EXISTS table1;`
@ThisIsChris does this relational algebra make sense?
@Jacob yes it does
@ThisIsChris these were the questions btw
It's for homework so I'm not expecting someone to outright give me answer or anything
I just wanna see if I'm doing this stuff at least somewhat right
I literally just learned it so there's probably some mistakes in there
It's up to you but the server isn't school - people should be able to exchange answers freely here ๐
oh haha true
I checked over 1a-d
1a 1b perfect. 1c 1d should be correct but just to be sure I would put parentheses around what you're union-ing and intersection-ing
so like a parenthesis before the join statement?
in 1c, a left parenthesis inserted between "sname" on the left and and the lower-case sigma on the right, then a right parenthesis at the end
oh okay thanks
๐๐ป
<@&435155896780324864> can anyone help me with SQL at the moment?
I figured it out
<@&435155896780324864> can someone merge some audio tracks for me and send it in a normal format that I can play on my phone?
I promise I'm not being lazy, it's just that my internet is insanely slow on my computer
it's for the Jared Taylor interview
maybe fix up the audio if you have extra time and know how but mainly I just wanna get it in a format that I can download and play on my phone
looking to make Jared Taylor your ringtone? lol
lmao no
I'm just trying to get it in a format that people can actually listen to
the recorder we used uploads in these weird multi track formats
actually I think I figured out how to do it myself
Is anyone here familiar with google docs? About a year ago, someone sent me a link to a google doc owned by someone I do not want knowing about my existence. I just checked my "shared with me" page on google docs and saw that document associated to the page. I right-clicked the document and selected "remove." Should I be worried? Once I have removed that document from my "shared with me" page, is the owner still able to see that it was once shared with me?
Depends, if it was a corporate, or school account the administrator could call up the file history of they needed to. If it's a personal account it doesn't seem to present that info to the user.
Source: am a Google Suite admin for an organization.
@Ecarttev Thanks! I am not sure what kind of google acount it was. At the most, would they just be able to see my google email address and username?
It would be your email. They would have to do very specific searches though, is not info presented at the top level. That's just things like, "file shared" they would need to dig to see it was you.
Ah ok. It was just some obscure and routine file that was probably buried by many subsequent update files. They would probably have no reason to look into who saw it and if they did my email would be meaningless and probably brushed off as belonging to someone no longer on their distribution list. From what I understand about google docs, the creator of the document determines who has access to it and unless they set it up so that only specific email addresses are allowed to view it, they have no expectation of privacy, as once they send out a link for a google doc, anyone who obtains the link is able to view it.
Is anyone in here knowledgable about visual basic?
<@&435155896780324864> ^
@GDoctor I have vague recollections of VB6 from about 15 years ago. Do you have questions?
Someone redpill me on VPNs
Tor for example anyone use it?
<@&435155896780324864> ^^
Ive used Tor. Tor is fully compromised by fbi and probably other intelligence orgs by owning the exit nodes. However unless youre doing something worth burning fbi assets and time on, then you are completely anonymous
VPNs are nice so your ISP doesnt doxx you, or to bypass location dependent filtering
What are we referring to
How could I get doxxed through this thingy
Your ISP is not going to casually doxx you but their threshold is lower than fbi. They can also be subpoened.
Bottom line. Dont do stuff thats illegal and VPN should be sufficient.
Thanks for the fast response. @Perihelion - CA @Mark Vandal hope that helps you out bro
It should be noted you can always give away your net identity using compromised browser or just doxxing yourself, e.g. start tor then login to google account in chrome.
for almost all purposes though, this isn't an issue
One big note about Tor. You can deanonymize yourself through sloppy browser usage. Basically if you start a session with a site before activating the onion protocol, and then activate it, your browser is going to keep the session open basically telling them: "HEY REMEMBER THAT GUY WHO WAS JUST HERE? YEAH? YEAH, I'M THAT GUY! YEAH MAN I'M TOTALLY THAT GUY." Don't do this.
best practice is use a browser dedicated to the onion protocol that starts tor on startup
spoilers: the darknet is pretty boring and mostly edgy larp
Privacytools.io read it
IP can give a lot of info even without ISP's cooperation. See this article: https://askleo.com/finding_the_owner_of_an_ip_address/
VPN will prevent this information from being disclosed.
@Mark Vandal going to have to disagree with @Perihelion - CA here. I think you should look up how TOR works, it's not complicated and I think you will see why I think it is the best method for privacy. All a VPN does is route all your traffic through a 3rd party so if they are compromised for whatever reason then all your privacy goes out the window. That can't happen with TOR because no one along the traffic route knows what is the information they are carrying and who it is going to or where it came from.
Sort of. You can be de-anonymized by compromised tor exit nodes. The FBI has done this. But as long as you're not trying to break the law in a way FBI is going to burn assets on, this isn't a problem.
VPN is pretty safe for all legal uses. Unless their management is corrupt (possible you must do your research), then they have to be subpoenaed to compromise you and some don't even keep sufficient records to comply with a subpoena.
neither technique is going to help you if you login to your google account in chrome though
If you use a VPN to login to twitter, twitter is going to see the VPN IP address. All they'll know is that you're a customer of that VPN plus whatever meta data your browser discloses. However if you login to that same twitter account from your android phone without a VPN at a later date, chances are that can be used to pinpoint your location or find your smartphone ISP (phone company).
One thing to keep in mind is that all this cross tabulation takes a lot of work and most people are not going to do it unless you really rustle their jimmies.
@Perihelion - CA As long as they have a no logs policy, you should be good. Nord VPN can even do Onion routing for your traffic.
that's nice but the single weakest point in a VPN is the owners
not sure who the nordVPN owners are and neither does anyone else on clear net apparently
of course someone knows who they are
anyhow, there's no such thing as perfect security
You are safe if:
Cost to de-anonymize you > cost of letting you stay anonymous
Agreed, their secrecy may be to avoid pressure from authorities or they could be glow in the dark. I just know their jurisdiction country is Panama which is outside of fourteen eyes.
If you are worried about state level actors then you're asking the wrong people for security advice.
1,350 total messages. Viewing 250 per page.
Prev |
Page 6/6