Pro tip: -z, -j are not needed by tar anymore since many years, tar will autodetect what compression was used if your distro is anything remotely modern.
😵
shakes head in Brexit
It’s weird they mention the C2PA but don’t link to it: https://c2pa.org/
I can’t access that (Reddit blocked in DNS), care to summarise?
I had no idea! That’s mental.
Self host RustDesk if you need an alternative.
Thanks, you’re the best.
…Can someone share that emoji, please?
This guy comes across as a bit of a nut. I don’t doubt the situations he lists, but saying things like “the whole of Azure was hacked” when it specifically was that an engineer’s auth cert was captured with malware to access M365 emails just screams panic merchant. Reading the posts they’re all #Cloud #Armageddon #2023 #hashtag
What a terrible article. Just pumps Huawei without any stats.
When this goes ahead, and it probably will, I hope that every single app implements it in a totally different, unfriendly, unautomated, way, or even better, make it unique per person, per app. Or, even multiple methods that are only available at certain times of certain days. It’ll be absolutely useless to the government if they have to wade through mud to get at the data.
Isn’t Starlink supposed to be ok?
That sounds awfully familiar.
130 down 20 up. £24/month. UK
It’s incredible it’s already here!
What is this, a meta-wank?
Correct. You know how JavaScript is not Java? Same thing. If memory serves me correctly there was a bit of a race to be the next Windows script language between NT4 and 2000 (to replace batch), and it was between VBScript and Kixtart (the former won out).
I kinda get it, but I also feel this going to be yet another ‘standards’ thing.
Most config files are here:
User specific tends to be in:
And when it comes to Windows, take your pick of the registry hive (HKLM, HKCU, …the other ones…), Prog Files, Prog Files x86, AppData (Local, Roaming, LocalLow), etc.
If it’s not, it’s usually trvial to find the config file from the running process as part of the launch command, or indeed in a softlock from their lsof output.
But, what if the config is not in a dedicated file? What if the config is read from a database? What if the config is interactively set at launch shudder?
I get it, the person is asking for it to be explicity pointed out in the documentation/help. However, if it’s not documented, then it’s probably shitty software - so why would you expect them to follow this rule just for config files?
I think, inevitably, this actually comes down to sysadmins who don’t bother to RTFM but also don’t push back on devs/managers when asked to fix something they can’t. Also, again, see the XKCD…
From a glance at the pne64 blog there hasn’t been a mention of PinePhone since Feb 2022 though. It doesn’t appear to be particularly active on that product.