You can deal with the non-static IP by using duckdns.org
You can deal with the non-static IP by using duckdns.org
Another copy. Would have been crazy if it was the exact copy I had.
I was at a used bookshop the other day and found the same Caldera Open Linux 2.2 book and cd that I used to install my first linux distro on a pc. Man that was exciting!
are you looking for a google drive replacement? or a tool to sync google drive to your linux/kde system?
Super!
I feel this
youruser:youruser
just means the user’s group. For instance, on my fedora 40 install, my user (bippy, just a silly name), is the username for my user, but also the name of the group that my user belongs to.
So when I do a chown
, I typically do chown -R
bippy:bippy path/to/directory
If you wanted to give permissions to a different group on your system, but also to your main user, you could do a chown -R bippy:wheel /path/to/directory
(wheel
is an example group name, which is similar to sudoers
)
It’s not that Linux can’t do what you specify, but that it may not do it in the way you require, which is based on your windows experience. Lots of what you describe can be done
For example, using command line tools like sed
, rename
, ffmpeg
, find
, etc…, you can do all of the text manipulation you can imagine.
But you also specify that you want gui wrappers, and in all likelihood, there are gui wrappers for what you want to do, but to meet your exact specifications, maybe not.
If you’re willing to do some adapting, which it sounds like you are, the. I think you can pretty easily adapt to Linux, as it’s perfectly capable of handling your high level requirements. It’s in the minutiae of how those requirements are met that is in question.
You could write yourself a bash script to do this.
Element/matrix does indeed have a web version. You can use https://app.element.io, or you can self host the web client.
Found it. Thank you!
No. Your best bet is with something like privacy.com or mysudo.
Edit: grammar
+1 for proton. Been using them for years now.
If it’s a MacBook that no longer gets updates from Apple then it’s probably from around 2014ish, and is definitely an Intel Mac. This is a great candidate for Linux. If you want an environment that is similar to Mac, go with gnome as the desktop environment. Outside of that, any of the major distributions should be fine. I’ve run KDE Neon, Ubuntu, and am currently running fedora on a 2014 iMac and all of them worked without issue.
Color me shocked that a meta product is sacrificing trust so the line continues to go up.
Not exactly what you’re looking for, but mysudo may work for what you want to do.
Definitely. Not to be ignored, but for lots of yubikey users, also not something to be overly worried about.
I went into the article thinking I’d need to replace my keys, and after reading decided I’m a very unlikely target for this attack. My threat model doesn’t include nation states, so I’m gonna keep using my yubikeys for the foreseeable future.
I have been thinking about new hardware key(s) that can handle more than 20 passkeys, but that’s not a high priority for me right now.
Ah. Yeah. I think then you’ll want to look into cloudflare tunnels. I believe that should get you through the cgnt and deal with the dynamic IP ll in one go.