Don’t forget the perk of forcing others to license the technology if they want to use it themselves.
Don’t forget the perk of forcing others to license the technology if they want to use it themselves.
In my case, I use a PCI card with an m.2 slot for my OS drive. I lose a PCI slot, but I already had a few to spare.
I use a 1tb ssd for the os/apps with my raid5 strictly for storage. Kinda nice if the os needs to be reinstalled or I want to migrate the raid cluster.
Me, an American, looking at 17: “You guys get to live 21 days per year?”
When you reach max level, you stop leveling.
Israel must be so proud, murdering starving and defenseless people.
If anyone demands I implement some feature into one of my open source projects that I either don’t have time for or don’t want to do, my response is one of the following:
But thankfully, my projects don’t have a very wide audience, so requests/demands are rare.
And this is the big long-term problem with Israel’s campaign of open genocide. They don’t care how many innocents are killed as long as they wipe out Hamas, but in the process, they’re inspiring more fanaticism in the region and fueling Hamas and other similar groups. Both Hamas and the Israeli government are terrorist organizations and they have a symbiotic relationship. The only real losers here are the innocent people caught in the middle.
Personally, I found Arch to be difficult to get installed. I’m ok with command line stuff once everything is all setup, but having to use it for the installation process is something I found to be too easy to screw up and too time consuming overall. Also, I haven’t seen any drop of vanilla Arch with a GUI installer. For the Arch experience, I generally go with EndeavourOS since it’s easy to install, gives you lots of options for the window manager, and is easy to use once you get it up and running.
If you’d prefer the Debian environment, I think anything from Debian or any of its derivatives (Ubuntu et al) would be a decent choice. My favorite is Linux Mint. I’ve seen a lot of people describe it like “entry-level” Linux, but it’s very capable and user friendly. It’s where I tend to spend most of my time when running Linux and I would say usually requires the least setup since it typically just works out of the box.
There’s also OpenSUSE Tumbleweed if you feel like going a somewhat different direction. I get more “traditional Linux” vibes from OpenSUSE, but packaged up in a user friendly manner. I play around with it from time to time in a VM, mostly when I want to test out some new server package locally. But, that said, it’s still capable of handling anything else I throw at it, so it’s fun to use all the same.
Who let Bear Grylls in here?
I started out with blue switches years ago and they were obnoxiously loud, so I switched to reds and used those for a long time. Though, I kinda got tired of them and decided to give the Keychron banana switches a try several months ago and I’m absolutely loving them. They have a light tactile feeling, but they’re much quieter than Cherry browns. And a huge bonus is that Keychron keys are hotswappable, so if I get any bad keys or feel like switching to a new type, no having to deal with soldering to replace them.
This is really nice. I’ve been using Mint for years and didn’t know about it.
In my experience, those things tend to be forced by project managers who believe the highest law of the land is proper scrum. Unsurprisingly, this makes all the devs miserable with no way to change anything because “this is just how it’s done”.
I do see a decent amount of activity on it. Full disclaimer, I am not a security expert. I know just enough to be dangerous. But, I see at least a few connection attempts from different IPs about every day. The top 3 countries of origin are China, Russia, and Brazil (based on the reverse DNS, but it’s possible some are using VPNs to hide their origin). My impression is they’re all bots that just go through a list of IP addresses, attempting to connect to the standard ssh port, then guessing the username and password. What I’ve found is they usually go through a list of likely ssh ports until one of them connects. Having the default port open to only the honeypot means they usually establish the connection, then leave it at that, so my real ssh port never gets hit. I kinda think of it like scambaiting, where I’m just wasting time they might otherwise spend trying to break into someone else’s real ssh server.
I have https open along with a non-standard port for ssh. Just for fun, I have the standard ssh port open, but redirecting to a Raspberry Pi running a honeypot. It’s fun to mess with foreign bots trying to access my network.
I’ve been working on a single bug for nearly 3 weeks. I think my “I’m getting closer to understanding this” is starting to lose credibility with my team.
It’s a great time to be making that push with Microsoft now talking about putting Windows in the cloud and adding all sorts of AI bloatware to the OS.
Structured in the streets, object oriented in the sheets 😏
Yeah, though it’s kinda wild how incredible Killer Instinct 2013 is by comparison.