• 0 Posts
  • 59 Comments
Joined 7 months ago
cake
Cake day: March 3rd, 2024

help-circle






  • Nougat@fedia.iotoretrocomputing@lemmy.sdf.orgLegend 730 Update
    link
    fedilink
    arrow-up
    5
    arrow-down
    1
    ·
    1 month ago

    … No. The computer has one power supply, and old computers from PB, Gateway, Dell, would have power supplies that produced barely enough wattage to run the hardware it sold with.

    You add another device, with its own power draw, and if you go over the limit of what the PSU is able to supply, something gets underpowered and misbehaves.

    Using a powered hub means that the power sent to the USB device is provided by the hub, and might make it so that OEM PSU is still sufficient. Here, though, we have already added an ISA>USB card.

    Another option is putting in a higher wattage PSU, but I don’t know what the connector used was on that machine. It might be hard to find something that would just plug right in.


  • Nougat@fedia.iotoretrocomputing@lemmy.sdf.orgLegend 730 Update
    link
    fedilink
    arrow-up
    15
    arrow-down
    2
    ·
    1 month ago

    I bought a few adapters for PATA/IDE to USB and they didn’t work. I had this weird issue where when I plugged the usb into my computer, the drive would power off. You can hear it spinning when it’s on, plug in USB, drive powers off. Unplug USB, drive powers back on. So after buying 2 different adapters, I gave up on trying to read it that way.

    This sounds like the PSU doesn’t have enough watts to go around when you’re plugging in a USB device that draws power. You might be able to get USB devices to work if you use a powered USB hub.









  • Nougat@fedia.iotoMemes@lemmy.mlSo much for Blockchain's real life use cases
    link
    fedilink
    arrow-up
    5
    arrow-down
    8
    ·
    edit-2
    3 months ago

    That’s not how that works.

    NFT is issued determining ownership to a property. Property sells, another NFT is issued, tied to the original one to maintain a chain of ownership. Issuance of a second NFT for a sale to a new owner would depend on authorization by the previous NFT holder. Lienholder information could also be stored, and linked to a mortgage NFT with payment history.

    The “NF” part of that stands for “non-fungible.” As in, once created, cannot be changed.


  • One of the things blockchain could do is become a digital proof of ownership, augmenting or replacing things like property deeds and car titles. We already agree that a written record of ownership of such things is legally binding (even if the writing is stored digitally), but transfer of that ownership to another person is still a very manual process. Imagine an NFT that represents ownership of your house, and when you want to sell your house, you transfer that NFT to someone else’s custody - adding their ownership information to it. It would record the entire chain of ownership, and specific details about the piece of property involved.



  • Nougat@fedia.iotoLinux@lemmy.mlWhy do you still hate Windows?
    link
    fedilink
    arrow-up
    3
    arrow-down
    3
    ·
    3 months ago

    The PIN is stored locally on the machine only. It doesn’t get synced with anything anywhere. It’s actually much safer to use a PIN for authentication because it’s four digits that you (well, maybe not you) don’t have to write down, and the only time it works is on the physical machine. The user account password can be long and/or complex, but if you’re only ever authenticating at the keyboard, all you have to remember is the PIN.


  • I’ll throw some more detail, still working from the “your computer” side.

    Your computer is almost certainly configured with a couple of DNS server IP addresses, belonging either to your ISP, or to some publicly available DNS server. When you’re going to www.hotmail[.]com, your computer just asks a DNS server that it is configured to ask - it doesn’t go to a root server (although it could, every computer is configured with root server IPs).

    But even before that, your computer first looks to its HOSTS file. That’s a local file that contains manually configured matches between DNS hostnames and IP addresses. Under normal circumstances, this HOSTS file would be empty, but it’s there. Side note: DNS (Domain Name System) is what replaced HOSTS files. Prior to DNS, a university network (for example) would distribute a hosts file for everyone to put on their computer, and that was it.

    Okay, www.hotmail[.]com isn’t in my hosts file, what next? Not a DNS server yet - next your computer will look to its local cache. You visited www.hotmail[.]com a couple hours ago, you haven’t rebooted yet, computer looks in its local cache and uses whatever it finds there.

    Not in the local cache? Now your computer asks the DNS server its configured to ask for everything. That DNS server has its own cache, so if anyone has asked it for www.hotmail[.]com recently, it already has it, and returns an answer to your query.

    If that DNS server doesn’t have the entry cached, it may be configured with forwarders. This essentially means “If I, a DNS server, don’t have a listing in my own cache, I will always pass the query to my forwarder instead of going to a root server.” There may be multiple layers of this kind of behavior, maybe the next DNS server even knows who’s authoritative for hotmail[.]com, and says “go ask them.”

    The last word, though, is always the root servers. Root DNS servers are authoritative for ‘.’ and they contain lists of TLDs and the DNS servers authoritative for those.

    Another thing to be aware of is that if a computer doesn’t have an IP address for a particular hostname (and it is not configured with a DNS server to ask for everything), it only returns “go ask this other DNS server” to the computer making the query, and then that computer goes and makes the full query to that DNS server.

    It is also important to make sure that the DNS server(s) your computer is configured to use are themselves trustworthy. “Dan’s Totally Not Sketchy I Promise Public DNS Server” could very easily be configured to believe it is authoritative for the hotmail[.]com domain, and hand you whatever IP address it is configured to hand out from its own “Totally Authoritative I Promise” zone file.

    And I forgot about TTL (Time To Live). TTL is measured in milliseconds, and generally speaking, only gets as short as fifteen minutes. If a cached record is older than the TTL, then the DNS server (or your local cache) will discard it and go ask for a fresh one. This does not apply to hosts file entries, or to static entries in an authoritative DNS zone file; those never expire.