• 0 Posts
  • 56 Comments
Joined 2 years ago
cake
Cake day: June 22nd, 2023

help-circle









  • This technique is often referred to as “over, under” as apposed to the more common “over, over” because it prevents damage or cable memory from twisting in one direction. Frequently used in the audio/video industry.

    The biggest downside is that if you pass the end of the cable through the middle of the bundle you will create a knot every other loop. These can quickly be unknotted by gathering the knots together in line and passing an end back through. Also makes a decent magic trick.

    A cable tie, hook-and-loop fastener, or a piece of rope or tie-line with a clove hitch in the middle is essential to secure cables while in transit or storage.


  • Godnroc@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    1 month ago

    I’m speculating, but it wouldn’t change a thing. You would still need to request domain addresses from a server somewhere, but traffic between your device and server would be encrypted in transit. The DNS server would also be verifiable to prevent imitators.

    So, the request would go to the PiHole and if it was not being filtered the PiHole would make the request of whatever upstream server is configured same as before.



  • Godnroc@lemmy.worldtoGames@lemmy.worldVoices of the Void
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    2 months ago

    I’ve been watching videos of this game for a bit and it is one of the better designed spooky games I’ve seen. The constant, random happenings keep it interesting; the simple loop of capturing signals and sending them of keeps things moving.

    I tried watching some big youtubers play it, but found that I enjoyed this guy with like 300 subscribers more. Syndrick on YouTube.