• 1 Post
  • 73 Comments
Joined 1 year ago
cake
Cake day: June 14th, 2023

help-circle






  • Any hard drive can fail at any time with or without warning. Worrying too much about individual drive families’ reliability isn’t worth it if you’re dealing with few drives. Worry instead about backups and recovery plans in case it does happen.

    Bigger drives have significantly lower power usage per TB, and cost per TB is lowest around 12-16TB. Bigger drives also lets you fit more storage in a given box. Drives 12TB and up are all currently helium filled which run significantly cooler.

    Two preferred options in the data hoarder communities are shucking (external drives are cheaper than internal, so remove the case) and buying refurb or grey market drives from vendors like Server Supply or Water Panther. In both cases, the savings are usually big enough that you can simply buy an extra drive to make up for any loss of warranty.

    Under US$15/TB is typically a ‘good’ price.

    For media serving and deep storage, HDDs are still fine and cheap. For general file storage, consider SSDs to improve IOPS.





  • Yes. But my point is that the IRS has a process for declaring and paying tax on income that you got illegally, whether it’s from being a mobster or working without the right visa.

    Capone didn’t follow that process, so got done for tax evasion.

    These illegal immigrants are paying their taxes, and therefore a) they aren’t exposed to prosecution for tax evasion, and b) the IRS won’t rat them out to ICE.




  • When you download a torrent, you’re downloading it from someone else’s computer. That ‘someone else’ is usually an individual, not some file sharing site with redundant servers.

    When you download a torrent, someone had to send it. It’s a small cost for individual torrents, but they had to pay for energy, internet connection, hard drives etc. If more people seed the torrent, you get a small bit of it from each seed, spreading the burden.

    If no-one with the torrent has their computer on and seeding it, you cannot download the file, because there is no-one to download it from. If there are several seeds with the torrent, then you can still download it even if one or more seeds turn the computer off at night, delete the file, or are overloaded.



  • SomeoneSomewhere@lemmy.nztoMicroblog Memes@lemmy.world"Freeloaders"
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    1
    ·
    2 months ago

    While immigrants in the country without authorization do not have Social Security numbers, they can file taxes using an Individual Taxpayer Identification Number, or ITIN.

    Reports about 3m people file using an ITIN each year, and the number of people expected to legally use them is very small.

    Also says they see about $12B more paid into social security by illegals than paid out.

    As Al Capone found, the government is would rather you pay tax on illegally earned money.





  • SomeoneSomewhere@lemmy.nztomemes@lemmy.worldYarrr
    link
    fedilink
    English
    arrow-up
    10
    ·
    2 months ago

    You can’t really have effective copy protection on any disc that can be played in a basic CD player; they’re just too simple.

    So Sony’s approach was to put an autorun installer for a ‘music player’ on the disk too. If installed, it attempted to lock your CD drive from being used by any other software and couldn’t be easily uninstalled. And they pirated open-source software (yes, that’s possible) to build it.

    SMH My Head.


  • SomeoneSomewhere@lemmy.nztomemes@lemmy.worldYarrr
    link
    fedilink
    arrow-up
    45
    ·
    2 months ago

    Try the Sony BMG Rootkit, contained on music CDs:

    In 2005 it was revealed that the implementation of copy protection measures on about 22 million CDs distributed by Sony BMG installed one of two pieces of software that provided a form of digital rights management (DRM) by modifying the operating system to interfere with CD copying. Neither program could easily be uninstalled, and they created vulnerabilities that were exploited by unrelated malware. One of the programs would install and “phone home” with reports on the user’s private listening habits, even if the user refused its end-user license agreement (EULA), while the other was not mentioned in the EULA at all. Both programs contained code from several pieces of copylefted free software in an apparent infringement of copyright, and configured the operating system to hide the software’s existence, leading to both programs being classified as rootkits.