

I don’t understand. You will still need to do administrative tasks once in a while so it isn’t really unnecessary, and if root can’t be logged in, that will mean you will have to use sudo instead, which could be an attack vector just as su.
I don’t understand. You will still need to do administrative tasks once in a while so it isn’t really unnecessary, and if root can’t be logged in, that will mean you will have to use sudo instead, which could be an attack vector just as su.
That’s w3m, an Emacs web browser, not webm the WebM file format.
Between IRC and the picture representing the idea of self-hosting, there’s the XMPP logo, which like IRC, is an instant messaging protocol (but with more features than IRC).
The FSF-approved distributions that are shown are: Trisquel, Parabola and GNU Guix (this one is actually quite neat, it’s based on NixOS with its own ideas like the importance of being able to bootstrap an entire system from a minimal binary seed)
The browser with logo shown is GNU IceCat, with binary blobs removed and with some extra security and privacy features (among them an addon that prevents the browser from running proprietary javascript)
lynx is a simple TUI web browser and w3m also is a similar browser but running in GNU Emacs
The last three are all the GNU Emacs logo.
The huge differentiator is that KDE may look like windows OOTB on most distros, but if you want you can easily make it look like Gnome, Mac, Unity… whatever. The panels and menus are infinitely configurable.
Is there a way to configure the look of all the apps running on kde? Because one of the main things that keeps my away from KDE is how ugly all the k* apps look out of the box.
I actually like Gnome. I like the way it looks and I have no problems with UX. I also don’t feel the need to use any extensions.
¯\_(‘_’)_/¯
It isn’t just a server thing. Discord can request a phone number from you if they think something unusual is happening. Trying to create an account while using tor will make them ask for a phone number, and they reject those numbers offered by shared number services.
Last I checked I could only share specific windows, not the whole screen. Later there was also an update with a window or screen selection dialogue that didn’t work at all, I think. After that I stopped using it on wayland.
I’ve never played Factorio and had fun playing the game. I think there is supposed to be a tutorial when you first start the game? And I think the tech tree is a good guide for what to do next.
https://prisonjournalismproject.org/2024/03/31/popular-video-game-banned-federal-prisons/
From my prison cell in Colorado, I conquered sites on alien planets, used conveyor belts to supply my factories, and organized weapons to defend against enemy attacks. I was playing Mindustry, a world-building game that relies heavily on logistics and strategy.
For less than $2, I could lose myself in my Android tablet at night — then, when I slept, my dreams about the game replaced my usual nightmares. And I wasn’t alone: Inmates talked about the game over meals and at work.
Then came an announcement from officials last July. Mindustry would no longer be on our prison-issued tablets.
“I knew a lot of people would be upset when I read they were taking it away,” one inmate from Nebraska said. “I could walk around the chow hall, my work assignment and other areas — everyone was talking about it.”
According to a statement from a Federal Bureau of Prisons spokesperson, Mindustry was removed because it was “found to jeopardize the safety, security, and orderly operation” of federal prisons.
When Prison Journalism Project asked for specifics on how the game jeopardized safety, security and orderly operation, the spokesperson said the Federal Bureau of Prisons does not discuss specific security practices or internal procedures for security reasons.
The game’s fans here in Federal Correctional Institution at Englewood, a federal prison in Colorado, included a retired colonel for the U.S. Army.
“All they’ve left us with are stripped-down children’s games,” he said.
Another player had one of the most elaborate mining and distribution centers I’ve ever seen, the fruit of many hours of thought — which, of course, is one key to fighting recidivism.
“Whenever I’m feeling upset, I can pick up my tablet,” the player told me. “It calms me down and changes my whole mindset.”
Users have come up with their own explanations for Mindustry’s fate. One theory goes that players had used the game’s drawing pad to sketch dirty pictures or leave secret messages.
Whatever happened, people are disappointed.
“I wanted to buy a tablet,” one person said, “but now that they’ve taken Mindustry I don’t want one.”
Sentiments like that are understandable. We are still without many of the tablet features we were told to expect, including free e-books through Project Gutenberg, video messaging, and a life skills program through Khan Academy.
In a statement, the prison bureau said that games are controlled by a vendor, and that the bureau has “the right to remove any game that it deems inappropriate.”
I miss the game. When I played it, I could stop dwelling on my past or my unknown future. And it encouraged me to be more social with others, especially when we would discuss strategy. My tablet now lies neglected in my locker.
The player who put together the elaborate mining center isn’t shocked that Mindustry is gone.
“It’s not uncommon for the BOP to take away something we like,” he said.
This sucks. :(
I personally use tankie.tube.
Linux is the kernel, not the OS. RedStar uses Linux as the kernel.
I like my toots.
Here you see the chinese meddling in other countries’ politics. The canadians are so brainwashed by the chinese that in canadian elections they vote for the Communist Party of China!
Thanks for the warning.
You can search for communities across all federated instances by clicking on “All” in the communities page: https://lemmy.ml/communities?listingType=All
This one, if by unix he also means modern linux systems. Nowadays you can simply use tar xf my-file.tar.whatever
and it should work on most linux systems (it worked on every modern linux system I’ve tried and every compressed tar file I’ve tried). I don’t think it is hard to remember the xf
part.
What I find interesting is that my bank has kind of the opposite stance. It allows you to do a lot more things if you login via their website and I think they overall trust your actions more if you do it over the browser, but you are required to pass a lot more security checks, while on the app a PIN is enough, but it also doesn’t allow you to do as much.
I wonder what sort of mitigations we can take to prevent such kind of attacks, wherein someone contributes to an open-source project to gain trust and to ultimately work towards making users of that software vulnerable. Besides analyzing with bigger scrutiny other people’s contributions (as the article mentioned), I don’t see what else one could do. There are many ways vulnerabilities can be introduced and a lot of them are hard to spot (especially in C with stuff like undefined behavior and lack of modern safety features) , so I don’t think “being more careful” is going to be enough.
I imagine such attacks will become more common now, and that these kind of attacks could become very appealing for governments.
What if you don’t have a static IP, do you ask your ISP in what range their public addresses fall?