• 1 Post
  • 40 Comments
Joined 1 year ago
cake
Cake day: November 17th, 2024

help-circle
  • I use a PiKVM to manage my server at boot.

    It streams video from the HDMI port so I can see what’s happening before boot, and plugs into a USB socket to emulate a remote keyboard.

    Saved me the other week when I installed a new network card and the server lost its network connection. Since I could still reach the KVM, I logged in remotely and solved the issue.

    Although some KVM devices can take power from the USB connection to the host, you should make sure your KVM has an independent power supply. Otherwise, when you shut down your server, the KVM will lose power and then you can’t remotely turn it back on again.



  • I know it’s late advice, since you already switched from Bazzite, but I’ve never understood why people have an aversion to adding a layered package to the immutable system.

    My attitude has always been: If an update breaks something, the whole point is that I can roll back. I’ve been running Fedora Silverblue with many layered packages for several years, and the worst thing that ever happened was when I had to delay a system update by a few hours because the latest build of a layered package hadn’t hit the repos yet.

    Plus, for anything like development work that requires build dependencies, I spin up a toolbox to compile it. The nice thing about the default toolbox is that it’s a base Fedora install, so all the system libs are compatible with my host machine. I’ve found it’s often simple to compile a project in the toolbox and then launch the executable from my host system without adding any new layered packages to it.



  • I lile my pinenote a lot. I mostly use it for reading.

    As long as I’m reading or doing any touch-screen-y things (taking notes, viewing images, etc) it’s great! For anything that involves writing/copying/pasting text, it’s not very usable with just the on-screen keyboard, you really need an external bluetooth interface. I find web browsing very tedious if I have to type anything in the url bar without a physical keyboard.

    Also, it’s still very much a WIP. The version of Debian it shipped with had a bug where I couldn’t install any software updates without deleting some random lib64 directory. Once I did that, everything was fine. The device has no security by default, so I created a new user with an encrypted HOME.

    With import tariffs to the US, I ended up paying $500 for it, which really got me down. As a $400 open hardware machine, it would have been easier to look past the rougher edges. And I wish it had more RAM.

    But overall it’s worth it to me because I’ve wanted a more libre e-reader for a long time. It’s gotten me back into reading books, which has been a lot of fun. Plus, because it’s an actual computer, I set it up as a tablet-like interface to my home automations.



  • From the original 404 article:

    And yet, this is of course an extreme example of the broader political project of AI chatbots and LLMs: They are top-down systems controlled by the richest people and richest companies on Earth, and their outputs can be changed to push the preferred narratives aligned with the interests of those people and companies. This is the same underlying AI that powers Grokipedia, which is the antithesis of Wikipedia and yet is being pitched by its creator as being somehow less biased than the collective, well-meaning efforts of human volunteers across the world.

    You may already know this, but a lot of everyday people don’t. They still think that a computer can’t have bias, and if all these tech bros and business leaders are talking about AI then maybe it does make sense to replace our society with an impartial machine. This article is for them.




  • Suppose you’re in some hypothetical country where torrenting is illegal. The presence of /usr/bin/qbittorrent on your disk could be enough to face charges. Unencrypted /var/log? Maybe they can see you’ve been running a cryptocurrency miner. There could be plenty of data outside of $HOME on your computer which a cop might try to use against you.

    In the most paranoid hypothetical scenario, someone could mount your unencrypted /usr/bin and replace openssl with a compromised version.





  • CrackedLinuxISO@lemmy.dbzer0.comtoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    2 months ago

    I wouldn’t think so. Isn’t bottles just an easier way to manage wine prefixes? If so, it doesn’t do anything to hide your Linux system from the executable.

    Wine prefixes are not sandboxes. They are a way to separate the windows-level configuration for different programs (eg env vars, or drivers, etc).

    Wine is a translation layer between a compiled windows binary and your Linux syscalls/libraries/device drivers/etc, nothing more.