I like computers, trains, space, radio-related everything and a bunch of other tech related stuff. User of GNU+Linux.
I am also dumb and worthless.
My laptop is ThinkPad L390y running Arch.
I own RTL-SDRv3 and RSP1 clone.
SDF Unix shell username: user224


Writes are asynchronous on Linux.
Unless I mount it with sync, which I wish would be default for non-system drives (which are going to be in fstab anyway). I didn’t notice any difference, aside from the lack of guessing when the magic is over. 2GiB goes into black hole, now what?


Sure



Huh? I was just randomly searching for something like this yesterday.


I haven’t yet mastered Vim, but say I want to delete a block of text, then I immediately see the relative line number up to which I want to delete lines + 1 (because current line is basically zero).
Say I have:
3 a
2 b
1 c
4 d
1 e
2 f
3 g
And I want do delete d,e and f, I do 3dd. With more lines, I don’t have to count.





Yeah, catbox was broken, and I don’t know another embeddable image host.


Yep.
set nu
set rnu


web sites are not actually inside their devices
Proceeds to:
Under proot I was also able to run Jellyfin server, and someone else also did Nextcloud and at some point a public BBS.
But oh well, soon Google will block unauthorized apps because I probably just purchased a license to use the phone, as opposed to actually buying the device.
As for why, it’s just a battery-powered computer, so why not. And by the way, Navidrome in Termux is probably as easy as it gets anywhere, since it’s in the repo. No docker or installing a .deb, just apt install navidrome.


the internet is broken
Well, true. IPv4 exhaustion yet not enough IPv6 support
de-peering
If this dispute escalates further and a complete de-peering happens in that case both networks will end up having a blackhole. Customers sitting on either side (and their single-homed downstreams) will not have any routes to each other.
BGP hijacking
On April 8th, 2010 China Telecom hijacked 15% of the Internet traffic for 18 minutes, experts speculate it was a large-scale experiment for controlling the traffic flows. The incident also affected US government (‘‘.gov’’) and military (‘‘.mil’’) websites.
Google is about to start requiring ID verification from developers to allow installation of their apps. “Unverified” apks will be blocked without GUI bypass.
Check “Google app developer verification”, I don’t have an article ready and my time is up.


Isopropyl alcohol 👍


Stop over-engineering shit, just do everything client-side like McDonald’s: https://bobdahacker.com/blog/mcdonalds-security-vulnerabilities


I usually use yes/no for the first condition if it’s XOR with 2 options (thus the second yes/no is implied).


Or in a VM
Problem is, some of this software may likely be made to specifically not run in a VM, since it is supposed to keep track of everything the student is doing during exams.


I just realized I sound way too paranoid but it’s an interesting question
Nope. Not paranoid enough. If school/work requires such software, that goes onto a separate device only for those purposes, which will then be considered untrustworthy environment like any public computer.
Although perhaps in a sense it is paranoid compared to what others do. Recently I’ve had to get something printed without having own printer. I’ve found out people have no problem logging into their Google or Microsoft account on public PCs.
I brought the PDF on a CD.
There’s a certain small chance that something malicious could be written to a USB, and I don’t know about all the possible vulnerabilities. If mounted, perhaps the automatic media thumbnail generator could be exploited. That is probably paranoid, worrying about random software installed on your own computer is certainly not.


How are you doing it?
I only tried X11 forwarding over SSH. It was slow and ate up a Gigabit.


It still looks like that, aside from the datk mode issue, but only in landscape orientation.


I hope there will be at least some bypass using ADB like with older apps.


You didn’t say which signal.
Alright, so others went over the “easy” way to see which program is being the offender. But I feel like the average Lemmy user just skips GUI at this point.

Say hello to KDE:
KDE also does automatic fsck before mounting, which is why it may take some 2 seconds to mount a drive.
HDDs it properly spins down and unpowers as well.