Communities

Writing
Writing
Codidact Meta
Codidact Meta
The Great Outdoors
The Great Outdoors
Photography & Video
Photography & Video
Scientific Speculation
Scientific Speculation
Cooking
Cooking
Electrical Engineering
Electrical Engineering
Judaism
Judaism
Languages & Linguistics
Languages & Linguistics
Software Development
Software Development
Mathematics
Mathematics
Christianity
Christianity
Code Golf
Code Golf
Music
Music
Physics
Physics
Linux Systems
Linux Systems
Power Users
Power Users
Tabletop RPGs
Tabletop RPGs
Community Proposals
Community Proposals
tag:snake search within a tag
answers:0 unanswered questions
user:xxxx search by author id
score:0.5 posts with 0.5+ score
"snake oil" exact phrase
votes:4 posts with 4+ votes
created:<1w created < 1 week ago
post_type:xxxx type of post
Search help
Notifications
Mark all as read See all your notifications »

Welcome to the Power Users community on Codidact!

Power Users is a Q&A site for questions about the usage of computer software and hardware. We are still a small site and would like to grow, so please consider joining our community. We are looking forward to your questions and answers; they are the building blocks of a repository of knowledge we are building together.

Activity for dsr‭

Type On... Excerpt Status Date
Edit Post #286323 Initial revision over 2 years ago
Answer A: Android phone, name associated with incoming call?
This problem is not generally solvable, because there is no universal "Android phone app", and that is what is responsible for showing you a particular display name. Google supplies an open-source version of Android that can be taken and adapted by anyone to run on a particular phone. Google doesn...
(more)
over 2 years ago
Edit Post #286120 Initial revision over 2 years ago
Answer A: How to download all mail in Claws-mail
The correct way to do this is to run an IMAP syncing program automatically, to keep a mirror of all your email on your local machine. Then you point Claws at the local machine, not at the remote IMAP server. As a bonus, any local mail client will be able to look at the local email spool. Syncing t...
(more)
over 2 years ago
Edit Post #285359 Initial revision almost 3 years ago
Answer A: How can I ssh to a remote server from my Chromebook?
The Secure Shell extension is perfectly appropriate here. SSH keys come in two parts: a private key and a public key. The public key is placed on the destination server(s), in (for example) `/.ssh/authorizedkeys`. The important thing about a private key is that it remains private to you. You ca...
(more)
almost 3 years ago
Edit Post #284913 Initial revision about 3 years ago
Answer A: Isn't Slug redundant, when Bleed oversteps the page and Bleed < Slug?
First: "actual stock" means the physical paper/wrap/billboard that your work is printed on. If this is an online-only work, there never will be actual stock. Different printing techniques have different accuracies for printable areas and trimming. The point of the bleed is to make sure that if you ha...
(more)
about 3 years ago
Edit Post #284591 Initial revision about 3 years ago
Answer A: How effortlessly can universities check where you logged in? What other IT details can they determine?
Accessing any server involves sending from a particular IP address to a particular IP address; the exchange of packets includes the sender so that the recipient can send packets back. An IP address belongs to an Autonomous System (or AS) which is generally a large entity on the Internet. Any IP ad...
(more)
about 3 years ago
Comment Post #281889 RAW is not a standard. Most manufacturers dump the data from the sensors into a TIFF variant. It's likely that two sibling Canon EOS of slightly different models but the same generation share the same output file format, but you can't necessarily compare across generations, and certainly not across ...
(more)
over 3 years ago
Comment Post #281888 You are technically correct, which is the best kind of correct because if you aren't technically correct, you aren't thoroughly correct. However, the original poster asked for ELI5, so I thought the small deviation from strict correctness to emphasize why hashing is used was worthwhile. If you ...
(more)
over 3 years ago
Comment Post #282320 What you are talking about is precisely this: "Port forwarding is a duplication arranged by another daemon, so that a client can talk to a specific port (say, 22) but the underlying daemon can be listening on some other port (generally above 1024)." In your particular case, your router is doing...
(more)
over 3 years ago
Edit Post #282320 Initial revision over 3 years ago
Answer A: Does changing a port address (number) necessates port forwarding?
When the ssh daemon starts up, it reads the config file for the interfaces it should bind to (listen on) and the port number(s). The default interface is "all" and the default port number is 22. The number was applied for and assigned as a well-known port number. On many systems, there is a file /...
(more)
over 3 years ago
Edit Post #282069 Initial revision over 3 years ago
Answer A: Is it possible to run the same version of MySQL on two servers, but use MySQL Community on one and MySQL Enterprise on the other?
Yes, you can do this. Remember that Oracle will eventually ask every person in the company "How many MySQL servers do you have?" Also remember that Oracle may make changes in their enterprise versions to make them incompatible with the open versions.
(more)
over 3 years ago
Comment Post #281888 There are two very reasonable choices: MD5 and SHA2-512. Use MD5 if speed is the most important factor. Use SHA2-512 if accuracy is the most important factor.
(more)
over 3 years ago
Edit Post #281889 Initial revision over 3 years ago
Answer A: Anti-Twin's Byte by Byte“ vs. ”Compare images (pixels)"
Images can be compressed to take up less space; most image formats automatically include this feature. There are two general categories of image compression. A lossless method is guaranteed to produce exactly the same picture elements (pixels) that went into it. A lossy method produces an approxim...
(more)
over 3 years ago
Edit Post #281888 Initial revision over 3 years ago
Answer A: ELI5 these 9 methods to compare similar pictures – Hash, MD5, SHA?
A hash is a mathematical function that maps a large number to a much smaller number. Files can be considered numbers; graphics files are certainly amenable to that. For example, an MD5 hash is always 128 bits long. You can feed any file to an MD5 hash generator, and the same file will always produ...
(more)
over 3 years ago
Edit Post #281887 Initial revision over 3 years ago
Answer A: What are the differences between OBS' 4 encoders?
Open Broadcast Studio is a program to allow live mixing of video and audio sources. One might use it to direct a digital broadcast of a play using several live camera feeds and sending the result to Youtube. The Encoder setting here selects the mechanism that will produce the final compressed vide...
(more)
over 3 years ago