There were some tools available to make it easy. For instance, to get a modeline that might work for your monitor just fill out this simple form.
There were some tools available to make it easy. For instance, to get a modeline that might work for your monitor just fill out this simple form.
My linux experience:
1993 - Hey, there’s a new Unix-like thing for the PC. You can check it out down at the university computer club.
1994 - Wow, I finally managed to get X running
1996 - It was somewhat normal for more nerdy software developers to run linux full-time on their desktop at work.
1998 - Linux was taking over servers to the point where you rarely saw Solaris, HP-UX, AIX around any more.
2002 - Everyone agreed that linux was pretty much ready to take over the desktop as well.
Maybe more people will join me in thinking that the best thing to do is to set browser.newtabpage.enabled=false and otherwise fiddle with the settings until it just shows you nothing but a blank page in a nice colour when you open a new tab or window.
…more fancy such as using tar -X, which works for me. I’d never actually tried it before. The ‘weird globbing’ it uses is regular expressions, which are worth learning how to use. Run grep "$expression" $_tmpfile
where $expression is a line from your exclude file to see which files it’s going to match and exclude.
I don’t know what fd does, but at a guess maybe what you’re missing is that tar includes all the files in directories you give it? So if you exclude ‘foo/bar’ but include ‘foo’ then foo/bar will be in your tar file.
What I do is basically tar cf `ls ~ | grep -v $files_to_exclude`
but if you want to exclude something that isn’t a top-level directory you’d need to get slightly more fancy.
Suddenly I’m worried about AI’s energy draw. “6 percent of global electricity” is not a small amount of electricity.
The model year and other relevant info is found in the first part of the VIN. There’s no legit reason for it to demand the whole thing, which it does.
Further searching turns up the information that “federated” Bluesky PDS instances are limited to ten user accounts each, and API usage limits which may constrain things further. So that would explain why there aren’t any big ones.
So far as I can tell they do all still “federate” through the central server, not directly with each other. So there being not much point in it may also explain why it hasn’t caught on.
Almost as bad as Threads, really.
Well, what’s a popular server? Are there several big ones? Sorry, but I really don’t understand why the answer isn’t turning up in web search results.
PS: Are you sure it isn’t just people who’ve done the “set your domain as your handle” thing but even so are still on the central one? Because even if they have made some small progress towards decentralization they absolutely have not gone so far that there isn’t still a central one.
Is it really? Seems hard to find out. Anyone have a list of Bluesky servers other than the central one with open signups?
I have no data on that. Cheaper and easier to get tlds like .world might be the most dangerous of all.
If it’s that bad, could you maybe give people a hint as to why we’d want to watch it and what it has to do with linux?
They’re probably just as dangerous as .com sites.
Default threat model: Some malignant demon, who is at once exceedingly potent and deceitful, has employed all his artifice to deceive me
#!/bin/bash
head -$[$SRANDOM % `wc -l /usr/share/dict/words | cut -f1 -d' '`] /usr/share/dict/words | tail -1
If it’s more than none at all that’s pretty good. But adhering to open standards is also a factor in how we should judge these providers which goes beyond that.
technically it doesn’t break e2ee
** for some unorthodox definition of e2ee
If the “endpoints” are defined as being somewhere outside the end users’ control, because for example the client software they have is designed to betray their secrets, then the system is no longer end-to-end encrypted in the way that both cryptographers and normal people would usually understand the concept.
Are some people likely to object [to being constantly watched by computers that analyze their behaviour and report any detected anomalies to the cops]?
Typically, no, but there is no accounting for some people.
A fitting epitaph for the human race?
smooth end-to-end encryption works only tuta-to-tuta or proton-to-proton
The difference is that proton tries to be somewhat interoperable with other services. It uses standard PGP encryption, you can import public keys to it from elsewhere, and you can download your private key from them if you need it.
*
Of course I meant that you can easily export the private key from their web client, which is not really a download as such.
I’m not a fan of the idea at all, but come on, it can’t really be that bad. There’s got to be somewhere you can tell it what environment variables to use. Probably something like
run0 systemd-edit /usr/system/systemd/systemrun/run0-environment --system-default=system