Fijxu

joined 1 year ago
[–] Fijxu@programming.dev 4 points 4 weeks ago
[–] Fijxu@programming.dev 4 points 1 month ago

~340GB, more than a million small files (~10KB or less each one). It took like one week to move because the files were stored in a hard drive and it was struggling to read that many files.

[–] Fijxu@programming.dev 4 points 1 month ago (1 children)

I don't remember the name but there is one alternative that is made on Python and you can write the rules on Python.

I don't know if it works on Wayland tho.

[–] Fijxu@programming.dev 3 points 1 month ago

Ruby? I'm in. (Although I use Crystal but the syntax is similar)

[–] Fijxu@programming.dev 2 points 1 month ago (2 children)

Are you using a NTFS drive to store the games?

[–] Fijxu@programming.dev 26 points 1 month ago

idk I use my own Peertube instance to upload shit. But you will never get a decent alternative to Youtube. Storage and Transcoding are VERY EXPENSIVE

[–] Fijxu@programming.dev 3 points 1 month ago (4 children)

Yes, forgejo. My hands are cold :s

[–] Fijxu@programming.dev 10 points 1 month ago* (last edited 1 month ago) (1 children)

I have been using TTV LOL PRO v1 with my own Russia proxy (I pay for it). You can use my proxy if you want: https://twitch.nadeko.net and I THINK you will get a few ads using the proxy on the webpage (https://github.com/younesaassila/ttv-lol-pro/discussions/37#discussioncomment-7668146) . I use Streamlink+MPV to watch twitch streams and I don't get any ads

 

BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the 'mp3' program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as 'telnet', which is used by hackers to connect to machines on the internet without using a telephone.

view more: next ›