Hurr hurr, I’m gonna plot f(x,y)=x2+y3 where y=x for x limit inf. Checkmate science!
Edit: the graph isn’t actually linear, man, and here I just thought it’d be that easy. :(
Hurr hurr, I’m gonna plot f(x,y)=x2+y3 where y=x for x limit inf. Checkmate science!
Edit: the graph isn’t actually linear, man, and here I just thought it’d be that easy. :(
This is the way!
Way simpler than using any GUI tool or somehow recreating the partition and manually copying the files.
Not sure if i understand the request, but there’s the [email protected] community if you’re looking for open signups.
I’m gonna be honest: I’ve been skimping on anti malware since i moved to Linux.
Still keeping up the common sense part about running code you don’t know and running untrusted code and weird URLs in a virtual environment (well, except for the AUR perhaps), but I only scan for malware once or twice a year, if at all.
Actually, I just did a scan with RKHunter which came back clean except for the usual false flags, which I find mildly suspicious as one would imagine there to be some malware with all the small time programmers and script kiddies in the Linux community.
What are you using as anti malware? Anyone knows of good methods for set-and-forget or some good GUIs for easy containment management, scanning, and whitelisting? It can’t be that ClamAV, RKHunter, and chkrootkit are the only halfway decent AVs out there.
Hadn’t actually noticed it was Mac first before you mentioned it, but no, if it works for Mac, then it likely also works for Linux (and that’s what counts, right?).
Contrary to my previous statement, I’ve actually tried downloading Zed. The first thing I noticed was the “sign in” in the top right corner. Feels rather unsightly, but no biggie. It appears to redirect to GitHub authorization, after which it fails with a “OAuthCallback”-error. Might be my fault, can’t remember if I’ve disabled or limited unnecessary functionality in GitHub.
The design feels slick and most options are hidden away or represented by only a small icon with tooltips. It appears that no advanced settings page exists, as nearly everything is handled in JSON (initially thought that a visual settings page must have been hidden away deep down somewhere, but that appears to be wrong).
Coop programming seems to be a big feature, but I’ll skip that as it appears to need setup.
Also, the LLM part is not nearly as prominent as their front page makes it out to be, rather feels like an option than a prominent or forced feature, so that’s really nice.
The included extensions (nice to have them as they’re no given) appear to focus on themes and syntax, can’t find any cross-development nor compilation related extensions which is just fine. Compilation is best handled in the terminal anyway.
Overall it feels pretty solid, definitely different from the first impressions of their page. Might be even better with more diverse extensions, though, I haven’t looked at the internet for unlisted extensions, and I’m not sure how old the project is (the extensions might just not be made yet).
There’s also no pop-ups, start pages with all kinds of featured content, nor settings or buttons that grab your attention away from your work (except the login button, perhaps. I would like to see what it looks like once logged in).
I’m probably missing most features as my GitHub integration fails, but I’m overall positively surprised.
Hmmm, the front page looks like they’re trying to sell a LLM code generator with additional QOL to businesses, and not a developer focused IDE or extensible text editor.
Definitely not something that catches my interest as a developer. Though, I haven’t tried it, so these are just initial impressions from reading their landing page.
Edit: also, why down vote the above? It appears perfectly relevant to the discussion. If you disagree, why not make a comment about it instead?
Huh? That’s quite interesting.
I’ve been running a hacked-together script which uses a disembodied copy of Proton 8 (aka. copied to a portable drive, doesn’t need to have Steam installed to run) to launch my games from Itch and GoG.
Hmm, just tried to use Proton 9.0-2 and the current experimental in my steamapps (which appears to be version 9.0-202), and it works just fine. Though, I guess Lutris’ implementations are quite a bit more advanced than my hacks (no debugging let’s goooo).
A very simplified version of my script, for those who might be interested: pastebin.com/kbNNvzAx. Don’t forget to uncomment game_exe
and set it to your executable - won’t work otherwise.
Also, pinging @[email protected] in case of interest.
I guess you could also ask: “Does the pro-tier give one any options/additional functionality that the non-pro/non-donation tier doesn’t?”
Obviously, if you have to pay for additional functionality (like settings/themes/updates) then it isn’t a simple ask for donation. Though, I’d argue to ignore trivialities such as “thank you”-emails and possibly a small visual-only token on the program that you paid/donated, as those barely count as “functionality”.
“Knowledge is never useless”
Going on a tangent here: While I fully agree with the above, there is an amount of knowledge after which fact checking becomes bothersome, and some people just skip fact checking overall. One could argue that, while knowledge is never useless, unchecked knowledge might become bothersome or dangerous.
See flatearthers, scientology, etc. for extreme examples.
Who else is excited for Rootkit “anticheat/DRM” requirements for web browsers? We all already give games full system access, so why not do the same for cookies?
There has to be a law against such heretical actions somewhere! Even if it’s .00, this computer is an affront to order! I propose we burn it alongside those frivolous computers who think they can simply name themselves .0 or .255!
Huh, is Windows screwing over GRUB and Linux not a bi-monthly experience anymore? Sad that it happened, but glad that it’s become novelty enough to write about.
Just detach the blades. You can always re-attach them when you’ve landed.
Thank you. The warning is gone, though the result remains the same. Sadly.
I figured that was the case, just wanted to point it out. :)
Boost does not render the image. Can’t even display the image when clicking on it as Boost’s integrated webbrowser just tries to download it instead. Also, HTTP warning.
We get to choose the genes when genetically modifying, and it usually takes a few years (plus health metrics and research once complete).
Contrary, when selectively breeding we can breed for traits which we are not guaranteed to actually get, and it takes a few decades (plus health metrics and research once complete).
Huh, I’m not sure they are comparable.
Didn’t USB A and USB B use a master-slave relationship in which the male would (generally) always be the slave, whereas USB C uses agreement and discussion to decide the master and slave roles regardless of connector gender.
Please do correct me if I’m wrong. Also, do we say “agent” now instead of “slave”, or what is the new term?
Should have seen him before!
Ideally, a .mp4, or any other non-executable file format, would not be able to execute rogue code on your computer, but the programs you use to open the files with might have security flaws which allow rogue code execution if done right.
You might have a hypothetical file, which might not be dangerous if opened with VLC, but which exploits a flaw in, say, Windows Media Player version x.y.z to execute a payload.
Sorry, for not including any examples, I’m currently not at the PC.