![](https://lemmy.ca/pictrs/image/33f22615-aa41-4fbd-9c09-d635020f2233.png)
![](https://slrpnk.net/pictrs/image/bbb6013f-4888-40a3-807a-cdbbefd116d1.png)
Apart from the license incompatibility (which doesn’t stop it from being used by distros, as Ubuntu has shown): While it’s a fantastic filesystem for servers, it is also resource hungry and not suitable for small or portable systems.
Apart from the license incompatibility (which doesn’t stop it from being used by distros, as Ubuntu has shown): While it’s a fantastic filesystem for servers, it is also resource hungry and not suitable for small or portable systems.
If it was really smart it would scan your butthole.
rapid mitosis
As in you are seeing multiple boot entries? It’s likely one entry per kernel version that you have installed. It doesn’t happen often these days any more, but in some situations it’s handy to be able to revert to a previous kernel if for example third party modules break.
It has implications on the effectiveness of VPNs on public networks.
Not sure about erasing all of it, but it is (or was) certainly possible to delete enough of it to brick a motherboard https://www.phoronix.com/news/UEFI-rm-root-directory
I don’t know where you got the idea that I’m arguing that old versions don’t get new vulnerabilities. I’m saying that just because a CVE exists it does not necessarily make a system immediately vulnerable, because many CVEs rely on theoretical scenarios or specific attack vectors that are not exploitable in a hardened system or that have limited impact.
GM had at one point been working on an eCrate block for conversions, but they seem to have abandoned it.
The fact that you think it’s not possible means that you’re not familiar with CVSS scores, which every CVE includes and which are widely used in regulated fields.
And if you think that always updating to the latest version keeps you safe then you’ve forgotten about the recent xz backdoor.
Just because it has a CVE number doesn’t mean it’s exploitable. Of the 800 CVEs, which ones are in the KEV catalogue? What are the attack vectors? What mitigations are available?
You did a recursive chown or chmod, didn’t you.
Brian Kernighan. Got the chance to have lunch with him!
Or they work in a regulated industry that requires pseudo-airgapped machines for remote users, e.g. the machine actually interacting with the systems needs to be within the controlled boundary but the company has a presence in multiple locations, so the solution is to have a Citrix server that the users remote into. But because the SSP also has access control requirements at every stage that take a long time to get updated to newest industry standards, the user still needs to have passwords rotated, MFA, and all that kaboodle.
Bazzite, as a gaming-first distribution, makes some choices that are acceptable for such a platform, but that I believe are unacceptable in a secure development environment. This is why I wrote “not ideal” instead of “bad”. If you don’t care about security then it’s perfectly cromulent. But I value security, so I would not recommend it.
Bazzite is a good HTPC or living room gaming distro. It is not an ideal all purpose desktop distro, just like a Steam Deck is not an ideal all purpose desktop system.
If you want a Bazzite-like experience that is better suited for the desktop then use Fedora Silverblue, which is what Bazzite/ublue builds upon.
Note that Wasabi has no egress fees, but has a transfer limit - essentially the contract stipulates that your monthly egress will be less than the amount of storage you pay for.
My mistake. I read your post as you using VMWare Workstation on Fedora, not the other way around.
Your other options are Virtual Box by Oracle or head down the Xen path.
Or, since OP is on Linux, a native KVM option like virt-manager or boxes.
With a fast charger, owners will be able to get to 80 percent of battery life in just 30 minutes.
Well I don’t think I’ll want to kill 80% of my battery in half an hour.
Fedora Silverblue.
You can, but you’ll need to increase the microwave’s power accordingly.