• 0 Posts
  • 47 Comments
Joined 11 months ago
cake
Cake day: August 12th, 2024

help-circle

  • groet@feddit.orgtolinuxmemes@lemmy.worldThe end is near
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    19 days ago

    Yes. But none of that is in the way of “the Linux desktop”. A more unified system with less modules and components (you know, like systemd being a solution to everything) is actually beneficial for wide spread adoption.

    People hate systemd for design and philosophy but not because it keeps new people from adopting Linux.





  • wg-quick creates a systemd service for each wireguard config you have. So if you set up a tunel called wg0, you should be able to run ‘sudo systemctl enable wg-quick@wg0’ This will make your tunnel connect on every boot. I have the same setup on my proxmox, so i can reach certain services of my homelab proxied through a root server (the other end of the wireguard tunnel)


  • I dont know enough about electronics to say for certain but I think Holding down the key doesn’t work from a technical standpoint. If you press it down before the relevant stage of the boot process is running there might not actually run any code to even detect the key press. And holding down a key doesn’t continuously send new keypresses. Only “key down” and “key released”.

    But 100% agree on the standardised key. And it should be something that ia on every keyboard and not behind an alternative funktion! No alt/shift/fn. Just make it enter or something!


  • groet@feddit.orgtomemes@lemmy.worldFirst symptom is locusts
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    2 months ago

    Old Testament god is not benevolent. They are based on ideals from a time where the natural thing to do after winning a war was to kill everyone of fighting age and take everyone else (especially the women) as slaves. Ever wonder how Moses’ people got to Egypt in the first place?

    Old testament god is a god of war and wrath. Killing only the Pharaohs would have been weakness.



  • The “biological reason” is “societal preconditioning”. Its Disney movies, toys marketed towards small girls, television, social media…

    Despite many advancements in equality, marrying a rich man is still seen (and marketed) as a live goal for women.

    Also, wedding and princess are pretty mutch the same thing for a girl. Pretty dress, center of attention, presents, etc. Its not about “getting married”.



  • Decryption is not related to root permission.

    If the ENCRYPTED drive is mounted to the container, then the container can decrypt it.

    If the DECRYPTED drive is mounted to the container, then the container never knows it was encrypted in the first place.

    Second case is easier BTW. Just mount the drive on your host, type in the encryption password and you get a new, unencrypted drive. Specify this new drive in your docker compose/docker file.




  • You can install packages from other places and create your own (and then install them). The distro maintainers have one (or multiple) list of “approved” software but you can add as many lists as you want to your package manager. Often software developers will have their own package list that contains only their own software and if you install it you have to add that list to your package managers trusted software locations. In that sense it isn’t really better than going to the developers website and downloading an installer on windows but it is quite rare you have to do that


  • Addresses change all the time. Especially big websites will have many addresses for the same name and depending who (or from where) someone is asking for the name, they will tell them a different address. That way someone from Europe will connect to a server in europe and someone in the US to an american server. And cloud providers will have hundreds of addresses that they reuse and rotate for many customers.

    Also to reduce the number of name request, the DNS system will cache answeres (save the answer and use it again later). If I ask for the address of Lemmy.org, they then change their address and I ask my DNS server again, I will get the old outdated address again.

    There is also the question of who is actually in charge of answering DNS requests to a specific name.

    All in all there are a lot of moving parts and for some reason people seem to be bad at managing their DNS records so when something breaks, very often it is because of DNS. (But also because DNS is very fundament so any problem with DNS will have a big effect so it is more noticeable)


  • There is a big difference between “not keeping logs” and “dont have a way to check what you are doing right now”.

    No logs just means they can’t check what you did last week but they can always check the traffic you are producing in that moment. If they see traffic from a torrent protocol they know you are torrenting.

    Edit: they do claim they do “No Monitoring” so yeah by their own words they should not be able to tell you are torrenting.

    No Monitoring

    We don’t monitor your activity and have no way of seeing what sites you are visiting. We do store when you last used Windscribe as well as the total amount of data used in a 30 day period (to enforce free account limitations and to prevent abuse).