• 0 Posts
  • 4 Comments
Joined 13 days ago
cake
Cake day: June 24th, 2025

help-circle
  • Welcome to everywhere. 3.5" disks in German are called “dreieinhalb Zoll Disketten”, and in Dutch “drie punt vijf inch floppys”. Both of those translate roughly to “three and a half inch disks/floppies”. Everyone borrowed US computer terms and translated them directly.

    No country uses the metric system exclusively. None. You will find exceptions if you look for them. This isn’t some kind of moral failing, it’s just practicality. Look at how car tires are sold for one example that’s nearly universal due to industry standards.


  • This is why for retro computers, I tend to prefer CompactFlash. IDE->CF adapters are cheap, and the cards are much higher quality. They effectively become an SSD that works on old stuff. (Just because I like retro computing stuff doesn’t mean I want the whole experience, like waiting for disk heads to move, or worse, tape drives to finish reading. I’m old enough that I remember dealing with it and I don’t need to deal with it again.)

    Not a lot of call for them otherwise, though. SD cards have gotten increasingly good bandwidth, which means they’re good enough for a lot of higher end cameras. CF is getting squeezed out.



  • frezik@lemmy.blahaj.zonetoSelfhosted@lemmy.worldJellyfin over the internet
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    2
    ·
    11 days ago

    Nah, setting non-standard ports is sound advice in security circles.

    People misunderstand the “no security through obscurity” phrase. If you build security as a chain, where the chain is only as good as the weakest link, then it’s bad. But if you build security in layers, like a castle, then it can only help. It’s OK for a layer to be weak when there are other layers behind it.

    Even better, non-standard ports will make 99% of threats go away. They automate scans that are just looking for anything they can break. If they don’t see the open ports, they move on. Won’t stop a determined attacker, of course, but that’s what other layers are for.

    As long as there’s real security otherwise (TLS, good passwords, etc), it’s fine.

    If anyone says “that’s a false sense of security”, ignore them. They’ve replaced thinking with a cliche.