For sure, just wanted to mention that it’s not just the China side of the trip you need to be vigilant about.
For sure, just wanted to mention that it’s not just the China side of the trip you need to be vigilant about.
https://www.microsoft.com/en-us/evalcenter/evaluate-windows-11-iot-enterprise-ltsc
Keep in mind, though, that you’ll still have to do some activation and KMS hackery to make them usable, but you can at least use an installer that’s going to be clean.
From Microsoft. They actually provide ISO downloads for the 11 LTSC versions, so there’s not really any reason to go grab some random one off totally-legit-software-and-totatlly-not-malware.com or whatever.
If your device is out of your sight, then yeah, you should probably assume it’s compromised.
Of course, that’s hardly JUST China doing funky shit with your devices, but depending where you’re calling home, odds are customs/immigration when you head home will try to do the exact same thing, too.
And the answer to everything is yes, always use a VPN if you don’t trust the network and you should never trust the network.
Judging from the last time I looked at their comment platform, it had the feeling that the only users of it were ones that were banned from Youtube because of the toxic shit they’re wanting to post so I mean, I guess, but it’s not the experience you’re wanting, probably.
Does !12345:p do what you want?
Edit: that also makes hitting the up arrow result in whatever command that was, so if you wanted to edit the line or whatever, you could !12345:p, up, then edit and execute.
Uh, are you sure your shell you’re using is bash and not zsh or something else?
Bash is indeed just !12345.
Why not save time and do it the other way?
Install the minimal/netinstall image, and then add what you need.
You’ll probably spend less time adding than trying to figure out what’s installed that you do or don’t need and trying to remove random packages without breaking anything.
Kudos for the unique delivery method, I guess?
(Also I do not like this sudden appearance of QR codes in daily life like for menus and shit for exactly this reason: just give me a URL if you must, or print something out and stop being cheap.)
Well, the article is talking 65 and 80w, so uh, that’s probably sadly not where these will end up.
There’s a big gap between the 15w tdp on the steam deck and either of those numbers, especially in battery life (unless measuring battery life in minutes) and the fact that 80w in a steam deck would be less gaming console and more portable burn generator.
For laptops, though, yeah, that’s looks pretty remarkable given that roughly equivalent laptops now use quite a lot more than 65w for that alleged performance.
two commands: dd and resize2fs, assuming you’re using ext4 and not something more exotic.
one makes a block-level copy of one device to another like so: dd if=/dev/source-drive of=/dev/destination-drive
the other is used to resize the filesystem from whatever size it was, to whatever size you tell it (or the whole disk; I’d have to go read a manpage since it’s been a bit)
the dd is completely safe, but the resize2fs command can break things, but you’d still have the data on the original drive, so you could always start over if it does - i’d unplug the source drive before you start doing any expansion stuff.
Yeah quicksync won’t help you there.
I thought nVidia’s limit was enforced by their drivers, but that’s probably changed since it’s been a while since I looked at nvenc as a solution (quicksync, then an ARC card over here).
dd then resize the fs?
If you have an Intel CPU with quicksync, it will likely perform better than the 1060 in terms of visual quality, if its coffee lake or newer (8th gen).
If not, well, it’ll be fine up to whatever the stream limit is (4?).
sidequests that involve you slowly following an NPC
I haate those quests. ‘Quick! We must urgently go do something to save everyone!’ and then waddles off like an over-stuffed penguin.
Can we PLEASE at least make these stupid NPCs walk at player run speed, it’s been obnoxious for like 30 years now.
Fair, but he said he wants to move from Windows to Linux, so I just assumed there wasn’t going to be any of those since, well, they’re not going to run in Linux anyways.
Not in a way you’re probably going to like.
You could set up a bare metal hypervisor on the system and set up a VM for your NAS, Windows, and Linux and swap between them as needed, but uh, that’s not really an exceedingly pleasant desktop use case, for a number of reasons, one of which is that you really won’t have the normal ‘sit down, and use the computer’ desktop experience.
Alternate option: run the NAS and either the Linux or Windows install in a VM, and keep it booted into, say, the desktop Linux environment with everything else being a virtualized setup.
Since android apps are required, I’d maybe go about this another way: find the app you like the most, then stand up whatever backend it uses for sync.
I was already in the FreshRSS ecosystem, but man, I don’t really like any of the android apps on offer, but swapping at this point would be annoying (bookmarks, saved stories, etc.)
good ideia to run restic as root
As a general rule, run absolutely nothing as root unless there’s absolutely no other way to do what you’re trying to do. And, frankly, there’s maybe a dozen things that must be root, at most.
One of the biggest hardening things you can do for yourself is to always, always run everything as the lowest privilege level you can to accomplish what you need.
If all your data is owned by a user, run the backup tool as that user.
If it’s owned by several non-priviliged users, then you want to make sure that the group permissions let you access it.
As a related note, this also applies to containers and software you’re running: you shouldn’t run docker containers as root unless they specifically MUST have a permission that only root has, and I personally don’t run internet facing ones as the same user as all the others: if something gets popped, then they not only do not have root permissions, but they’re also siloed into their own data in the event of a container escape.
My expectation is that, at some point, I’ll miss a CVE and get pwnt, so the goal is to reduce how much damage someone can do when that happens, rather than assume I’m going to be able to keep it from happening at all, so everything is focused on ‘once this is compromised, how can i make the compromise useless to the attacker’.
And the amazing variety of points of interests and quests!
You can have literally dozens of combinations!
(Still salty about Starfield, don’t mind me.)