![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/2QNz7bkA1V.png)
I believe that one was patched a while ago
I believe that one was patched a while ago
I’m a big fan of tiling window managers like i3 or awesome (awesome wm). Awesome is the one I use. It’s tiling and the entire interface is built from scripts that they encourage you to modify. Steep learning curve but once you get it how you like, there’s nothing like it.
*privacy from everyone except us, which conveniently makes our ad revenue line go up.
I actually had one of these myself. I worked at a college help desk as a student, and I got a call and the guy said “every time I flush the toilet, Xbox live disconnects”
My first thought was that it was a joke, the absurdity of the thing right? I unironically asked if I was being pranked, and he said he knew we wouldn’t believe him so he made a video. Sure enough, he walks into the bathroom, flushes the toilet, and like 5s later his Xbox shows a disconnection message on the TV.
Absolutely dumbfounded, I sent the networking guys up to his room, and like all of these stories, it does have a reasonable explanation. They ran the xbox’s Ethernet cable under a rug that was in front of the bathroom. Every time someone went to the bathroom, they would step on the cable, and the Xbox would disconnect. The timeout was 30s or so, just long enough that they’d pee or flush the toilet or whatever before they noticed the disconnection.
“Phonk” traditionally referred to the music style itself without lyrics, but as most emerging music styles do, it’s evolved into a sort of new-age emo/grunge mix of Phonk, Hip-Hop, and Alternative Rock. All of the below can be considered modern phonk, even though in the strictest sense, traditional phonk is lyricless. A lot of people will know the “phonk walk” song Why Not by Ghostface Playa
https://www.youtube.com/@trash-gang This youtube channel has popularized many of the rising artists in the genere as it’s evolved over the last 3-4 years, and if you’re looking for some recommendations from an enthusiast, check out (in no particular order):
especially true for when manufacturers stop supporting the console you invested into, stops making replacement parts, issuing security patches, etc. Having the ability to make, repair and use copies of the games you purchase is critical to digital preservation.
I certainly wasn’t just born good at this. Unironically if you want to learn how something works, try to automate it. By the time it’s automated you’ll understand basically every part of it at at least a basic high-level.
That would be diabolical lol
That’s a good word. I always love learning new words. Thank you!
It’s like they think V for Vendetta was a blueprint for how to run a utopia.
I have condensed almost all of my workflows into pure bash scripts that will run on anything from bare metal to a vm to a docker container (to set up and/or run an environment). My dockerfiles mostly just run bash scripts to set up environments, and then run functions within the same bash scripts to do whatever things they need to do. That process is automated by the bash scripts that built my main host. For the very few workflows I have that aren’t quite as appropriate for straight docker (wireguard for example) I use libvirt to automate building and running virtual machines as if they were ephemeral containers. Once the abstraction between container and vm is standardized in bash, the automation doesn’t really need to care which is which, it just calls start/stop functions that change based on what the underlying tech is. Because of that, I can have the canary system build and run containers/vms in a sandbox, run unit tests, and return whether or not they passed. It does that via cron once a week and then supplants all the running containers with the canary versions once unit tests pass.
Basically I got sick of reinventing the wheel every time a new technology came out and eventually boiled everything down into bash so that it’ll run on anything it needs to. Maybe podman in userland becomes the new hotness next year, or maybe I run a full fat k8s like I do at work. Pure bash lets me have control over everything, see how everything goes together, and make minor modifications to accommodate anything I need it to.
It sounds more complicated than it really is, It took me like a week of evenings to write and it’s worked flawlessly for almost a year now. I also really really really hate clicking things by hand lol, so I automate anything I can. Since switching off proxmox, this is the first environment that I have entirely automated from bare-metal to fully running in a single command.
I’m incredibly lazy; it’s one of my best qualities.
Virtual machines also exist. I once got bit by a proxmox upgrade, so I built a proxmox vm on that proxmox host, mirroring my physical setup, that ran a debian vm inside of the paravirtualized proxmox instance. They were set to canary upgrade a day before my bare-metal host. If the canary debian vm didn’t ping back to my update script, the script would exit and email me letting me know that something was about to break in the real upgrade process. Since then, even though I’m no longer using proxmox, basically all my infrastructure mirrors the same philosophy. All of my containers/pods/workflows canary build and test themselves before upgrading the real ones I use in my homelab “production”. You don’t always need a second physical copy of hardware to have an appropriate testing/canary system.
I have to imagine that most of these data brokers don’t have automated ways to remove information, it’s probably designed to be as annoying as possible to prevent people from doing it en-masse. If someone on mozilla’s end has to fill out a form and mail it and deal with ~200 brokers worth of constant intentional subtle constant changes (designed to break automation) to try and make services like this harder, the $9/mo seems almost reasonable.
Are… hygienists famously known for not being smart? I don’t think that’s a thing lmao
Generally end-user applications like Firefox would be the latest/same version, but system libraries might be a few versions different. Generally security patches are written for a few major versions of libraries/daemons at the same time. So features might be different but it’s all the same security for the most part.
That’s the major draw between one distro to another, they will have different philosophies on what to include, and what major version to use. Debian for example is much more reluctant to upgrade something unless there’s a large demand for a new feature. The theory is it is more stable and consistent to use that way.
Ubuntu on the other hand features much more modern versions of libraries because they want to be more hip and modern, expecting users to learn new things more often because they think the new features are worth it and they want to support all the things.
Yes but they use different repositories with different maintainers. Think of a package manager like steam, epic, etc, except instead of games it’s everything. Some package managers get different applications, some have different versions of the same applications. In the case of Debian/Ubuntu it’s more like steam in China vs steam in the rest of the world. Same steam, different games, different maintainers of who decides what games get to go in which steam.
Pvp is completely dead, which I think was the game’s greatest longevity strength. Mechanically it’s quite dated but the writing is very fan service
This still doesn’t solve the issue with underlying kernel feature and function compatibility. 99% of the time when I have an issue getting something to work, it’s because of something like my LTS kernel doesn’t support floc(), etc.
This only solves competence issues, it does nothing to resolve the difficult compatibility problems.
Context/region blocking is a very quick and inexpensive path to basic security. At work I have sets of iptables rules to block regions by country code and by context (i.e VPN provider, datacenter provider, etc). I’ve found that some services will go from tens of thousands of brute force attempts per day to 1-2 per month. It really is crazy the amount of routine attacks that come through VPN providers if you host services in the professional world.
Does this mean that legitimate users can’t use a VPN to access our services? Yes, but we also don’t sell any data to any third parties so I don’t feel so bad about it.
Generally the lifecycle with this sort of thing is old_thing becomes an alias to new_thing, and eventually old_thing gets dropped as an alias down the line.
It’s still decent advice to learn dnf native calls and to update scripts using yum to those native calls.