Worth keeping in mind that the steam deck uses a distro based on arch, so it might be inflating the arch numbers in that steam survey.
Worth keeping in mind that the steam deck uses a distro based on arch, so it might be inflating the arch numbers in that steam survey.
Then by that logic, redhat is leeching off the work of the Linux kernel developers and the other Foss software in redhat
You can change the config so you don’t need to give the password every time.
Adding the persist option only requires it once every few minutes within a terminal session.
https://manpages.debian.org/bullseye/doas/doas.conf.5.en.html#persist
You can use the magic bytes to detect it. Pretty sure windows executables have MZ as their magic bytes
2 scenarios where it can be exploited:
Acquiring the ability to compromise a server or perform an adversary-in-the-middle impersonation of it to target a device that’s already configured to boot using HTTP
Already having physical access to a device or gaining administrative control by exploiting a separate vulnerability.
This gets around that: https://archive.is/lRY3v
With wear levelling on SSDs you may be able to recover some of the data
$50 M per year is a crazy subscription price
Thank you very much!
Does anyone know what show this is from?
Yeah it’s Nathan for you. In this episode he goes to a food place that always has really long lines and proposes they let people with a really good reason cut the line. The guy on the right made up an excuse to cut the line, so they told him he was the 1000th customer and he won a prize (can’t remember exactly what it was, but it was to get him out on the boat), then they had a fake family shame him once he was out on the boat.
Yeah they gave us the multi-volume masterpiece ‘The Lusty Argonian Maid’:
Not entirely related but found this interesting:
“The Waffle House Index is a metric named after the ubiquitous Southern US restaurant chain Waffle House known for its 24-hour, 365-day service.”
“It’s a useful metric to determine the severity of a storm and the likely scale of assistance required for disaster recovery”
It’s a real-time operating system frequently used for small and embedded devices.
The most likely issue you’ll encounter is that it blocks almost all message attachment types, so if someone texts you an image, PDF, contact card, etc, it will completely block the attachment.
Would that make prebiotics neutral since they’re on the fence?
I’d just like to interject for a moment. What you’re refering to as Linux, is in fact, GNU/Linux, or as I’ve recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX.
Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called Linux, and many of its users are not aware that it is basically the GNU system, developed by the GNU Project.
There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine’s resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called Linux distributions are really distributions of GNU/Linux!
There’s a great Sam o nella video about this.
Invidious link to it: https://vid.puffyan.us/watch?v=XKRW1zgkCVc
Think of it like a club with a max capacity of 10 people, where some people have VIP cards. If a person with a VIP card wants to get into the club, the bouncer will kick out one of the people inside that doesn’t have a VIP card to make space for them.
For a more technical explanation:
There are several processors on computers and each can be in use by 1 process at a time. Different processes can get different amounts of time based on their priority (called niceness in Linux) and they’ll be removed from the processor once their time is up until their next share of time.
On a real-time kernel some processes are marked as real-time (certain range of niceness values, can’t remember the exact range). If a process that is real-time says it needs some processor time, a process that isn’t real-time that’s currently running will be immediately ripped off the processor to make room for the real-time process.