Absolutely. The only difference is that the benefits aren’t imaginary, they are quite tangible.
Absolutely. The only difference is that the benefits aren’t imaginary, they are quite tangible.
Inadvertent oracle attack.
For your use case, consider it to be a packaging format (like AppImage, Flatpak, Deb, RPM, etc.) that includes all the dependencies (including services, not just libraries) for the app in question.
Should I change this?
If it’s not broken don’t fix it.
Use Podman (my preferred - the SystemD approach is awesome), containerd, or Incus. Docker is a graveyard of half-finished pet projects that have no reason for existing. Podman has a Docker-compatible socket, so 100% of Docker tooling will work with it.
The language itself has no type enforcement, the type checking is implemented within nixpkgs. This might seem like pedantry, but it really matters for things like LSPs (text editor autocomplete). I think that’s what scares some people off: it’s like OG Minecraft, you need to have the wiki/search.nixos.org open while you are doing your editing.
That being said, the type checking goes much deeper than what the windows registry does - e.g. it won’t allow you to enable conflicting services - like grub and systemd-boot - at the same time.
Apparently the upgrade (including configuration) is incredibly smooth. Those interested in tinkering with the vanilla experience have had to install it in a VM.
Nah, it’s just Linus. I have endless time for people who want to learn. Linus doesn’t want to learn, he wants to be right.
I’m 110% with you here. Debian have make it much more difficult to break your system, so it should be stack sponge proof going forward. I still wouldn’t put it past Linus to fuck it up some other way (you know, maybe he’ll curl HTML into bash instead of a script), and he’ll still stand his ground and blame the world. And then later give one of his non-apology apologies.
I used to be a huge fan.
All software has bugs, including Linux. Some bugs can lead to security escalation. Those bugs are called vulnerabilities. Like bugs, all software has vulnerabilities - including Linux.
Your webcam can be accessed by hackers on Linux, on Windows, on MacOS, on BSD, it doesn’t matter.
There’s a difference between “can” and “want.” For example, OP might have been planning to watch his home vids with your mom, but couldn’t due to a rolling update.
Linus is dunning-kruger crystallized and refined. He routinely talks authoritatively about subjects he knows little about. His qubit analogy is particularly wrong and annoying, and he doesn’t stop bringing it up.
Either way, more idiot filters have been installed in front of that and you’ll have to do way more work (likely learning something in the process) to fuck your system up like that.
It does. I have it enabled and tested. “Client Device Isolation.” It’s enabled per SSID.
Ooh I like the idea of “no Internet.” I do trust all of those devices (open source), but they could still be pwned.
All this, and while you’re at it, Donate!
Assuming you’re using Windows: https://www.howtogeek.com/784196/how-to-edit-the-hosts-file-on-windows-10-or-11/
Point its domain at 127.0.0.1.
You can do the same on Linux by editing /etc/hosts
I had to fix an issue on my wife’s laptop. If you haven’t used it in a while, do yourself a favor and try it. It’s far worse than you think.
Indeed. UKIs are the way.
With a plan like this:
and even seize and destroy its hard drives to help wipe out the emulator
I assumed it was closed source. How stupid are Nintendo lawyers?
I’m not a fan of Rider, it’s just that OmniSharp outright breaks on large/real-world projects and Visual Studio doesn’t work on Linux. I don’t use their products out of choice.
This kind of gatekeeping is what scares people off.
export PATH=$PATH:/mypath1:/mypath2
in~/.profile
. Means “add:/mypath1:/mypath2
to what is already in $PATH.” If you need the entire system to be aware, set or update it in/etc/environment
withPATH=...