Just a reminder that the internet was recently shredded exactly by the security infrastructure.
Just a reminder that the internet was recently shredded exactly by the security infrastructure.
I have a feeling calling the “The Great” enshitification will age up like that one “The Great” War.
an immutable distro is not necessarily declarative
It is necessarily so. You can’t configure an immutable distro by a sequence of mutations.
But yes, the other way around is quite possible.
So, you need a unix time value followed by 000?
That first part you can calculate with date +%s -d '2024-07-02 12:00'
.
That’s just sloppiness.
The information that familiarity gives you is “WTF does this field means”, and it’s the only thing that’s actually there. How you get a value and how a value is formatted are things no amount of expertise will save you from having to tell the computer, and thus you can’t just forget about.
(And let me guess, the software recommended install is a docker image?)
Oh, the headless version of the game makes much more sense than a headless link.
But if you launch a headless program underneath your particular user, with which you’re then going to log off, then it will close regardless
Nohup is your friend.
You say some software is “headless” if you can launch it, log-off your computer and it keeps running.
I imagine it’s a link suitable to use with c-url, but I never even noticed it’s there.
You mean like NixOS?
It wouldn’t technically stop anything, it would just make your live Hell on Earth if you tried to add that self-updating ring-0 proprietary software in your servers.
But I guess what you are looking for is immutable infrastructure? That one would stop the problem.
Yep.
But there also exists Endpoint Detection and Prevention System, Intrusion Prevention System, Enterprise Security system, Network Threat Detection, Network Threat Prevention… And all those things name the exact same products (or at least, products you buy bundled on the same package).
Somehow I managed to use the one acronym that is wrong.
It’s an oops.
It should be IDS.
It’s only marginal for running custom code. Every large organization has at least a few of them running important out-of-the-box services.
It is on the sense that Windows admins are the ones that like to buy this kind of shit and use it. It’s not on the sense that Windows was broken somehow.
Well, “don’t have self-upgrading shit on your production environment” also applies.
As in “if you brought something like this, there’s a problem with you”.
Remember guys, it took about a decade for Solar Winds to discover somebody had root access to everybody that used their software, another decade for somebody outside Solar Winds to discover it and tell everybody, and half a decade with nobody claiming to have solved the issue up to now.
So when you believe that your computer with an EDS is safe just because you can’t use it, think again.
It has been in exponential growth since the signal was distinguishable from the noise, and exponentials do not have inflection points…
The only inflection we can expect is when it reaches 1/4 of saturation.
Yep, different licenses have different consequences.
The same way, if the BSD internet stack was GPL, we wouldn’t have an internet at all.
That’s quite a bad way to express yourself.
But then, the Lemmy front-page sending unsuspecting new people into a place where they will censored if they try to speak against of dictators and human rights violations isn’t a good thing. So yeah, Lemmy is better with the ML not listed.
No, AIs have been capable of looking at your code|text|image|whatever and telling the project apart. For ages. It’s not even impressive anymore.
It peaked somewhere between 2000 and 7. Personally, I place it in XP, but opinions vary.