It’s IPv10, which binds IPv4 and IPv6 together (4+6=10), sometimes known as Dual Stack.
- 0 Posts
- 29 Comments
nonentity@sh.itjust.worksto Mildly Infuriating@lemmy.world•Bill and Melinda Gates and Warren Buffett’s Giving Pledge after 15 years: Only 9 of the 256 billionaires actually followed through on giving away half their wealthEnglish2·1 month agoFinancial obesity is a large part of capitalism, but it’s by no means exclusive to it. Replacing capitalism with anything that tolerates obscene wealth accumulation would be a categorical failure.
nonentity@sh.itjust.worksto Mildly Infuriating@lemmy.world•Bill and Melinda Gates and Warren Buffett’s Giving Pledge after 15 years: Only 9 of the 256 billionaires actually followed through on giving away half their wealthEnglish82·1 month agoFinancial obesity is an existential threat to any society that tolerates it, and needs to cease being celebrated, rewarded, and positioned as an aspirational goal.
nonentity@sh.itjust.worksto Technology@lemmy.ml•I tried living entirely on IPv6 for a day, and here's what happened15·2 months agoThe goal today isn’t to make single stack IPv6 internet practical, it’s to make dual stack ubiquitous. Once that’s achieved, the cost differential, and the increasing technical burden of maintaining IPv4 hacks, will reach a tipping point where it’s relegated to legacy status, but this is at least a decade away, with likely another decade of inertial decay of public IPv4 after that.
nonentity@sh.itjust.worksto Programming@programming.dev•AWS deleted my 10-year account and all data without warning852·2 months agoThe cloud is, and always has been, merely other people’s computers.
Their only legitimate use case is as disposable, transient, dumb nodes and synapses of a system you retain control and agency of.
The reason IPv6 was originally added to the DOCSIS specs, over 20 years ago, is because Comcast literally exhausted all RFC1918 addresses on their modem management networks.
My favourite feature of IPv6 is networks, and hosts therein, can have multiple prefixes and addresses as a core function. I use it to expose local functions on only ULA addresses, but provide locked down public access when and where needed. Access separation is handled at the IP stack, with IPv4 it’s expected to be handled by a firewall or equivalent.
No one who legitimately knows anything about computing speaks like this.
He’s truly a moron’s hallucination of a genius.
Every number system is base 10.
Binary is base 1+1.
Ternary is base 2+1.
Octal is base 7+1.
Decimal is base 9+1.
Duodecimal is base B+1.
Hexadecimal is base F+1.
I remember when this applied to 8kB.
nonentity@sh.itjust.worksto memes@lemmy.world•You leave once the ride is over! And not a moment before!264·4 months agoThe Hippocratic oath is far too frequently interpreted as a mandate to unilaterally inflict life as broadly and indiscriminately as possible.
nonentity@sh.itjust.worksto Programmer Humor@programming.dev•muskrat's data eng expert's hard drive overheats while processing 60k rows44·6 months agoEither she knows something novel, where processing data using voice coils is somehow beneficial, or is someone who calls their computer a ‘hard drive’, which summarily negates any legitimacy of technical competence.
nonentity@sh.itjust.worksto linuxmemes@lemmy.world•I didn't know you were supposed to disable root user...2·7 months agoI’ve recently seen login attempts using keys, found it curious…
nonentity@sh.itjust.worksto linuxmemes@lemmy.world•I didn't know you were supposed to disable root user...21·7 months agoPermitting inbound SSH attempts, but disallowing actual logins, is an effective strategy to identify compromised hosts in real-time.
The origin address of any login attempt is betraying it shouldn’t be trusted, and be fed into tarpits and block lists.
nonentity@sh.itjust.worksto Memes@lemmy.ml•only one message for reposters: If you didn't make it, don't post your lazy regurgitated trash.6·8 months agoMaybe this already exists, but what about a feature which allows tagging a post as a link to a previous/original post, which can be used by clients to filter out reposts if desired.
Not Linux, but VMS is specifically designed to run on VAX systems.
nonentity@sh.itjust.worksto Programmer Humor@lemmy.ml•It's a Unix system! Elon knows this!80·8 months agoHe truly is an idiot’s concept of a genius.
No one who anctually understands Unix or IP networking would ever craft that as an explanation for this concept.
That said, it’s an excellent explanation of how a lobotomy helped him embrace his true self.
Nut milk comes from male cows.
Wireless data links should be the exclusive domain of temporary, nomadic and/or sacrificial applications.
If the channel is permanent, static, or critical; as much of the path as practicable should be provisioned with constrained energy transmission.
You drive a vehicle with a manual transmission.
You steer a vehicle with an automatic.