Shoo, it’s been a rough week for sddm over here…
Shoo, it’s been a rough week for sddm over here…
I don’t have a 470 in front of me. Did you push the “external display” function key combo or configure it in your desktop environment?
If you still have the card those came off of you can put it back in a galaxy (or any android device?) and export them. Pretty sure the phone uses some kind of error correction scheme to deal with failing sd cards.
Yeah I haven’t run into suse because I live in a place that gets lots of good ol boy deals from red hat but that would be the other good choice!
E: actually, you’re right I should learn suse! The time is now!
Do it the official way. SIM cards are cheap.
I use Debian and rhel. That’s basically the two things you’ll see in the world and the two toolsets that familiarity with is useful.
There’s some little computers running weird shit like 9front or gentoo but if you wanna branch out from Debian stable but not get weird I recommend learning rhel.
Of course, if your backup laptop is really a backup, install stable on it and be done.
Everything is encrypted with iCloud except for email and something else that’s obviously not encrypted that I can’t fucking remember.
iCloud encryption can be defeated with a server side key that’s used by Apple if you need to recover your account (so like you get your account hijacked or forget your password or something). Apple can be compelled by subpoena, like any other company, to provide the contents of your iCloud because they have this capability.
If you don’t like that, you can turn on advanced data protection, which deletes their server side key, generates new keys and re encrypts everything after you write down your special alphanumeric key without which your iCloud contents are inaccessible.
The security checkup in settings will let you figure out who has access to what.
You can look at security failures as mistakes or conspiracies.
It’s very easy to see the Microsoft failures as conspiracies the more you learn about them because Microsoft’s material interests are aligned with the failures. To steal someone’s turn of phrase: “Microsoft gives you a foot gun for free but charges for bulletproof shoes”.
It’s very easy to see apples security failure as mistakes because the more you learn about them the more you see how apples material interests arent aligned with the failures. If I had to make a similar one liner, “apple sells you designer shoes with drop rated toe boxes. They might not be bulletproof, but you also don’t have a foot gun.”
usually monitors can be freely rotated. if yours can’t, the back usually has a square vesa mount on the back and you can just take out the four screws and reattach it the way you like.
None of the desktop environments like xscreensaver because it breaks their window decorations and input handling. It does this for security purposes because its job is first and foremost to be as secure as possible then once that’s done go ahead and make pretty pictures.
If it sounds crazy that input and window decorations would be insecure, peruse the maintainers webpage and be horrified.
Wayland needs infinite workarounds to get xscreensaver working because the way you’d do it under the Wayland framework is with a weird method called uhh ext_session_lock (I reference it in another comment but I’m not sure that’s the right one now.) which at least as of about a year ago let screen locking programs handle passwords directly!
I think it’s an artifact of open source software being maintained by people who are on the payroll of companies that rely on the software.
I mean, it absolutely could if stuff like ext_session_lock weren’t incredibly insecure.
There’s a thread on the maintainer of xscreensavers website that talks extensively about this and it got me trying to get just some stubs hooked into several wayland environments, seeing how the sausage is made and putting Wayland back on the shelf.
Cd into the directory first, then run rm -rf, then cd back out and rm -r just the directory.
E:fb
CSS are used to establish whose phone (the therefore who) is in a location and whose phone (and therefore whomst) sent and received data at what times.
That information is what police will use as probable cause to get warrants against the services you use if not your person or home.
Good.
The Luddites were right.
Thinkpads, macs and dells are what I use.
They’re cheap and have lots of spare parts lying around.
I like my security bugs well publicized with documented workarounds as opposed to undiscovered and undisclosed, thank you.
Apropos of nothing, Xscrensaver is my bellwether for moving to Wayland. When it’s officially ported I’ll switch.
This shit right here is why you absolutely must use xscreensaver.
Not some repackaging of the hacks.
Not some implementation with your wms decorations.
Xscreensaver.
Yes. Make sure neither are mounted.
Use larger block sizes with bs=<like, idk, 16M> will make it go faster.
dd
Sometimes stuff won’t chain boot from within ventoy.
It’s worth noting that gold plated connectors are not snake oil. Gold is a good conductor and doesn’t form a nonconductive oxide layer. That means it’s going to be more durable and won’t corrode together or apart like those old ass sheet metal tube sockets that all need to be cleaned.