

Pfft. That sounds like something a pocket calculator would say.
Just a regular Joe.
Pfft. That sounds like something a pocket calculator would say.
struts in his fancy pants
Be careful of dualstack and IPv4-only VPNs. The client can discover and advertise the real IPv6 address, even if adequately firewalled. I’m not sure if gluetun addresses this risk.
edit: this should be considered a risk even if you don’t have IPv6 support today, as this could be enabled by your ISP in the future, then automatically enabled on your network by your router.
Hah. I was just playing a YT video of modem sounds for my son, after showing him some “history” videos about early PCs, BBS’s, text adventure and early commodore* and PC gaming.
History? I lived it, son.
Grey-stubble Gen-X’er here… The 80s and (moreso for me) 90s were a great time to get into tech. Amiga, DOS, Win3.11, OS/2, Linux… BBS’s and the start of the Internet, accompanied by special interest groups and regular in-person social events.
Everyone was learning at the same time, and the complexity arrived in consumable chunks.
Nowadays, details are hidden behind touchscreens and custom UXs, and the complexity must seem insurmountable to many. I guess courses have more value now.
Only in the US, and for mapping companies that now have to treat the US as a “sensitive” country.
The rest of the world can continue to call it by its internationally recognised name.
PIPEWIRE_LATENCY=1024/48000 %command% if using pipewire. You can change those values as needed.
Some civilized countries have a process whereby partial rent can be legally withheld/deducted, incentivising them to fix it quickly. Less civilized countries require you to engage a lawyer and risk having your rental contract terminated unilaterally.
Don’t know about “happily”. “Readily” might be more accurate.
Nothing like a good pillory to brighten your day!
Additional SPoFs: Your upstream internet connection, your modem/router, electricity supply, your home (not burning, flooded, collapsed, etc.). And you.
Not sure it’s essential, but it seems the norm.
Anything that helps breaks the twit’s influence is useful for now, though.
Nokia Jaws was the best.
You have an opportunity. Give him a pre-installed Linux and a terminal, along with a page of commands that he can run to do neat things… including starting the GUI to watch his favourite (ideally pre-downloaded) videos, running some demos, etc.
Don’t make it too easy, but not too hard (2 you said? Can type a few characters though…)… Add to it over the years, unlocking the power, and guiding him to discover more by himself.
Kids won’t become tech savvy if we hand everything to them on a silver platter, with touch screens, controllers, and flashy games. It can be bland and boring, until they do something.
It might just be the most life changing gift they ever receive.
That was IRIX (SGI’s UNIX) with the “fsn” file browser, if the Internet is to be believed.
Not A.I, just a terrible system that incentivises (and even demands for public companies) abusive behaviour.
Some Competitive Multiplayer games that generally “just work” and perform well under Linux/Proton: Insurgency Sandstorm, Hunt Showdown, Hell Let Loose, Dead by Daylight, Battlebit
An apparmor profile is associated with an executable, based on its filesystem path. I think distributions tend to support either SELinux or Apparmor, but some (like Arch) support both.
Apparmor profiles are easier to reason about than SELinux, I find.
I have two apparmor profiles targeting shell scripts, which can run other programs. One is “audit” (permissive with logging) and the other is “safe” (enforcing).
The safe profile still has a lot of read access, but not to any directories or files with secrets or private data. Write access is only to the paths and files it needs, and I regularly extend it.
For a specific program that should have very restricted network access, I have some iptables (& ip6tables) rules that only apply to a particular gid, and I have a setgid wrapper script.
Note: This is all better than nothing, but proper segregation would be better. Running things on separate PCs, VMs or even unpriviliged containers.
There have been a few cases, of course. There have also been investigations and prosecutions. But it is NOTHING LIKE russia’s forced conscription in LPR / DPR.
The anti-Ukraine propaganda effort is very real, and organized. You can see the propaganda-boys/bots in the comments here - just look at the frequency and content of their posts and comments.