You could use a custom XferCommand
command per PACMAN.CONF(5)
with wget using -6
Something like this might work:
XferCommand = /usr/bin/wget -6 -c -O %o %u
You could use a custom XferCommand
command per PACMAN.CONF(5)
with wget using -6
Something like this might work:
XferCommand = /usr/bin/wget -6 -c -O %o %u
If you want something similar to vim or neovim, but without all the fuss learning how to configure it and install plugins and such, you could try helix.
I would return it, but if you are curious you can try some of the following to get experiencing identifying bad disks.
You could try a different computer or controller to be sure.
If you can get some writes/reads to work, you can use badblocks or dm-crypt: https://wiki.archlinux.org/title/Badblocks#Alternatives
Badblocks will write known data to disk then read it to verify its good. If the disk is malicious, this can be faked. badblocks is also a little slow.
Using dm-crypt in the wiki will write zeros through dm-crypt which will result in random noise being written to disk, then compare with zeros to verify reads are good. This can not be faked easily since the zero stream is encrypted as it is written to disk.
I would advise just creating ~/.bin
or ~/.local/share/bin
and dropping it in there. As long as you have permission to that directory, yt-dlp should be able to easily update itself.
Don’t buy into tape. It is costly and is inferior to hard drives by most metrics for smaller scale operations. You can easily get 8TB hard drives for less than $20/TB. While tape is cheaper than that, the drive to actually use it is expensive, plus you get all the disadvantages of the tape itself.
Fun fact: you can probably buy a whole server, external sas card and disk shelf for less than the cost of a somewhat modern tape drive.
If you are wanting to store less than 100TB of data, it would probably be cheaper to use drives, then in 3-5 years buy another set of disks and still be ahead compared to tape.
You are right, you can’t use only information Ukraine or Russia provides. But it probably is the case that Ukraine was stomping Russia for pennies on the dollar earlier in the war. However, Russia is not a static force. They learn and change their tactics, and Russia spends more resources now than they did earlier.
It would be a grave mistake to stop aid to Ukraine while they are still willing and able to fight.
Which one is it?
If you were willing to spend money, why not just get it from RH directly.
It’s basically how widevine works. The hardware “secure” boots the OS, and the OS only loads signed code. And there is a chain of custody all the way to the hardware, so the software that communicates with the server can attest that it is the same as what they expect.
The simple explanation is that they wish to further erode property ownership by the proletariat by locking down operating systems such that they can’t do as their owners wish, but only what the corporation wants.
The likely retaliation RH/IBM would take is simply banning the account, not starting a lawsuit immediately. However, rights holders may attempt sue before or after such an event, but likely after.
RH thinks they have the right to distribute code in this manner, and they can keep doing so until challenged in court. You can do actions in general without asking the court every time, I think the same applies here as well.
I personally think it is a violation in a strict sense, but at the same time I don’t think it really matters too much realistically. Stream is upstream RHEL, and they are very similar, and at some points in time, should be identical. It’s also not clear what you get exactly by suing RH/IBM. The likely case is that they settle or rule to have that section removed from the ToS.
Maybe, but in practice nothing happens. Microsoft has had numerous issues reported to them before, years ago, and the issue reported to them was never fixed or taken seriously. Then years later, the issue is sometimes rediscovered and they find the report from years earlier, and nothing happens.
Until legislation gets passed to force companies to take liability of their software, nothing will change.
I know btrfs alone doesn’t replace unraid on its own, but it does replace or at least substitutes most of the raid functionality. Btrfs is extremely flexible and it’s raid features are almost unmatched in capability for running in small environments where you may need to increase or decrease the number disks in an array at will and without much limitation.
If you want a gui to manage various linux systems, you could look into cockpit. It can manage VMs, containers and other linux systems via a unified gui. I would recommend fedora if you want to give it a go.
But you do you. I have not really had the desire to use unraid since i already know linux and manage the system myself without many tools, but i understand most people do not know linux that well and learning is a significant time sink.
Tbh, you might just consider using btrfs instead. Using pirated software to run a nas doesn’t seem like a great idea when btrfs is so easy to use for making flexible storage arrays.
Tbh, I don’t think encryption matters that much for are usually public chat channels.
The private communication should be safe since i think the users will usually pin the keys for each other.
Insurance doesn’t work very well for things like hurricanes. When big events happen that cause large percentages of their policy holders to file claims at the same time, it results in large payouts which causes increases in price. When prices go up, people don’t insure. This combined with the fact that florida gets hurricanes means prices for insurance are high.
Maybe the state could help by introducing laws to help combat insurance fraud, but that could lead to consumers getting fucked by their insurance companies.
Tbh, just stop using software well past it’s prime, or pay the cost of developing the fixes.
Everything can’t be free, at some point it’s gotta cost something.
I more or less was just looking for a general survey of what other people used.
I agree installing a binary for this small kind of thing might be excessive.
Google and other search engines can crawl lemmy just fine. The only downside is that the information will be split across domains unless google puts in a special case for lemmy/fediverse or something.
Email isn’t that secure anyway (don’t use email if your life or freedom depends on it), so I don’t see that as much as a downside.
Does that only happen when it tries to download files ending in .db.sig? If so, I think I read somewhere that db have no sig. So as long as it otherwise works, this error is cosmetic.