[-] [email protected] 5 points 4 months ago

Here’s a post explaining how dual booting works.

When you turn on your computer, the bios or bios equavalent goes down its list of devices to try and boot from. It might have usb or cd first and ssd next, so if you put a cd or usb it’ll boot that automatically.

Devices that can be booted have special instructions in the first part of their storage that can be used to operate the hardware.

When the bios finds a device that can be booted it hands the hardware off to that device and breathes a sigh of relief, most of its work is over. That devices work is just beginning though.

If it finds a windows disk, that disks bootloader will load a minimal set of hardware drivers necessary to load the rest of windows and it builds itself up towards having a functional running windows operating system and presents a login screen to the user.

If it finds a Linux disk, the disks bootloader will do the same thing but instead of loading a set of drivers, kernel and configuration that let it start a windows system it will build towards having a running Linux system. Duh.

When you dual boot, the device the bios finds to boot from doesn’t do either of those things, it runs a bootloader that presents you the user with a choice between the two, then hands the task off to one or the other based on your choice.

Setting up dual booting means clearing off space and shrinking the windows partition so you can have a Linux partition, installing Linux to it and then installing a bootloader that gives you the option to use either os.

[-] [email protected] 5 points 5 months ago

There’s a lot of arguments for one solution or the other based on security or privacy, but let me present a different scenario:

Imagine you’re in a natural disaster. Your home based self hosted server is down because of a general rolling network outage or just irrecoverably destroyed. Your offsite on the other side of the county is in a similar state. Can your cloud hosted backup be accessed at generic, public computer in a shelter or public building?

Bitwarden can. It has specific instructions for doing so as safely as possible.

[-] [email protected] 5 points 5 months ago

It’s a duplication of functionality in kernel/dma.

That’s why the submitter didn’t say “I didn’t submit to kernel/dma, checkmate libs!”.

The intent is to duplicate functionality in kernel/dma then get it included directly or linked to.

That’s what the r4l project is trying to do explicitly!

Before you say that kernel/dma didn’t have functional easy to use rust bindings, so the commit couldn’t have duplicated functionality: someone on kernel/dma said they didn’t want that and suggested using the c bindings instead which is what every other language has to do. Which means there was already a solution that was functional.

It’s like if there’s a community bicycle and you bring your drill and tap set so you can mount your bottle caddy and the community says “please don’t make a hole we have to tig in. Just use a pipe strap.” The right answer isn’t to start building a whole new down tube you can tap for an m5 for your bottle caddy, it’s to just use a pipe strap for your bottle caddy.

I didn’t read the linked article (or any linked article about this) because I’ve been reading the mailing list. Reporting on the kernel and people’s behavior on the list is tiring and often includes a bunch of baseless speculation.

[-] [email protected] 5 points 5 months ago

Again, so much of the discussion around kernel mailing list exchanges excludes the context that what hellwig is talking about is not rust in the kernel at all or even r4l but a split code base.

I dealt with a c/c++ codebase once and it was beyond my meager abilities to handle both those ostensibly similar languages at the same time and I had people who were very knowledgeable in c involved with the project.

So when someone says “I think a split codebase is cancer to the Linux kernel” or “I will oppose this (split codebase) with all my energy” I’m like “yeah, that makes sense.”

I also need to clarify that I don’t think anyone is sabotaging anyone else and my intent in bringing up the simple field sabotage manual was to point out that the behaviors don’t necessarily indicate sabotage but fall into a broad category of behavior that isn’t gonna solve problems or get anywhere which is why it’s included in the manual.

I wasn’t aware it was circulating in social media recently and about fifteen years ago when I got exposed to it the main lessons to draw were not that people doing those things were active saboteurs but that those behaviors can lead to waste of energy and resources and they’re the first thing to avoid interacting with.

My exposure to and understanding of the manual was “here are some things to avoid in your own life” not “here’s how to throw a wrench into their plans!”

[-] [email protected] 6 points 5 months ago

My understanding is that the rust code in question implemented parts of the c dma interface so that rust programs could use that instead of the c dma interface.

I’m out in the world, not sitting in front of a computer with the source open so that guess will have to do for now.

The most immediate problem with having two different dma interfaces is that now you have two maintainers and an extra step at best when making any changes.

[-] [email protected] 4 points 5 months ago

I think I got in before they started doing that.

Actually I don’t think they require that. I just set up a new proton account on a device with a fresh wipe from a vpn endpoint I never used before and they offered to record a phone number or recovery email but didn’t require it.

[-] [email protected] 5 points 5 months ago

Earthsea is what you want.

[-] [email protected] 6 points 5 months ago

You can’t use xscreensaver on wayland.

[-] [email protected] 4 points 5 months ago

It’s one technique used to hide and move money all the time.

A different way is to buy some asset in the destination nation then sell it when you arrive. So like a bond or an etf share or something.

[-] [email protected] 5 points 5 months ago

Debian, lxqt and x11.

If you can get an ssd in there then there’s some zram or something or other that can make it even better.

[-] [email protected] 6 points 5 months ago

It’s not p2p but at least many years ago:

SMS.

If the Internet outage is local then the towers would still work and you’d be able to get texts. I went through a few storms where wired home internet was down, the towers weren’t giving me a data connection (no mobile web browsing or anything), but I was able to send and receive texts.

If you really care about what you’re asking after, do what someone else said and get a radio license. It’s 150 year old technology and every time something happens radio operators pop up some kind of emergency communications or bridge to the internet through repeaters or something.

[-] [email protected] 4 points 5 months ago

Someone already linked to journalctl, but if you just quickly want to look, the command journalctl and the flag —since will get you going.

Journalctls output can be piped, so if you know what you’re looking for you can grep it easily.

view more: ‹ prev next ›

Gayhitler

0 post score
0 comment score
joined 5 months ago