Skip Navigation
🐧> 🪟
  • Well yes, assuming that:

    1. you trust the hardware manufacturer
    2. you can install your own keys (i.e. not locked by vendor)
    3. you secure your bios with a secure password
    4. you disable usb / network boot

    With this you can make your laptop very tamper resistant. It will be basically impossible to tamper with the bootloader while the laptop is off. (e.g install keylogger to get disk-encryption password).

    What they can do, is wipe the bios, which will remove your custom keys and will not boot your computer with secure boot enabled.

    Something like a supply-side attack is still possible however. (e.g. tricking you into installing a malicious bootloader while the PC is booted)

    Always use security in multiple layers, and to think about what you are securing yourself from.

  • Has anyone used Preveil? How is it? Is there any other services similar to it?
  • Remember: militaries usually buy from the lowest bidder, so anything military-grade is probably low quality.

    Also, email isn’t a great medium for communicating securely, since the other party has to be just as mindful about security as you; otherwise it’s basically security theater.

  • Help with sed commands
  • I get it, sometimes you just do something for the challenge.

    It’s really great what you can accomplish when you know a little more than the bare minimum of the tools at your disposal (^^,)

    And I had the same experience after learning a bit more about awk for the fist time, hahaha.

  • Jackett memory leak
  • Virtual memory is different from swap memory.

    Swap memory is used when you run out of physical memory, so the memory is extended to your storage.

    Virtual memory is an abstraction that lies between programs using memory and the physical memory in the device. It can be something like compression and memory-mapped files, like mentioned.

    And yes, some swap is still useful, up to something like 4G for larger systems.

    And if you want to hibernate to disk, you may need as much swap as your physical memory. But maybe that’s changed. I haven’t done that in years.

  • How to cope with English spelling
  • Ah I now get what you’re trying to do, I think?

    Having some kind of sonic(?) shorthand for specific spellings right?

    It’s kind of like trying to solve the Gothi problem, maybe?

    Needlessly complicated, but that’s a common theme in English anyway, so it should fit right in.

    And I love this line 😂

  • How to cope with English spelling
  • If you’re mapping a specific mouth sound to a specific character, why not use the IPA? That’s exactly what it is designed to do.

    That way you don’t have to reinvent the wheel.

    For a better introduction to the IPA, check this video.

  • Help with sed commands
  • In the end I've used the first command you wrote, because KISS, but I appreciate your explanation

    There’s no shame in combining multiple tools, that’s what pipelines are all about 😄.

    Also there’s a different tool that I would use if I want to output a specific column: awk

    df -h —output=avail,source | awk ‘/\/dev\/dm-2/ {print $1}’
    

    For lines matching /dev/dm-2 print the first column. awk splits columns on whitespace by default.

    But I would probably use grep+awk.

    Sed is definitely a very powerful tool, which leads to complex documentation. But I really like the filtering options before using the search/replace.

    You can select specific lines, with regex or by using a line number; or you can select multiple lines by using a comma to specify a range.

    E.g. /mystring/,100s/input/output/g: in the lines starting from the first match of /mystring/ until line 100, replace input with output

  • Help with sed commands
  • The easiest way is probably without sed, which you mentioned:

    df -h --output=avail /dev/dm-2| tail -n1
    

    But purely with sed it would be something like this:

    df -h --output=avail,source | sed -n ‘/\/dev\/dm-2/s!/dev/dm-2!!p’
    

    -n tells sed to not print lines by default

    /[regex]/ selects the likes matching regex. We need to escape the slashes inside the regex.

    s/// does search-and-replace, and has a special feature: it can use any character, not just a slash. So I used three exclamation points instead , so that I don’t need to escape the slashes. Here we replace the device with the empty string.

    p prints the result

    Check the sed man page for more details: https://linux.die.net/man/1/sed

  • Docker to Kubernetes, ZFS to ... ?
  • That would be block storage like glusterfs or ceph, or object storage like minio or rook.

    You could also use ZFS to provide PVCs for your Pods, with openebs.

    If the mini-servers don’t have hardware redundancy, I’d stick to Replicated Volumes only…

    If you go the openebs+ZFS route, you can make a kubernetes service (DaemonSet because it should run on every node) that makes and sends/exposes ZFS snapshots.

  • Healthcare rule

    Tweet is from around February 2022; I’m not visiting that cesspool to find the exact date.

    88
    Me watching ENT

    GIF of Mr. Bean looking for something in a panicked manner with the caption: “me trying to find the remote until the skip intro button disappears”

    25
    The rule of growth

    I’d like to thank the admins for being so open and direct about the issues that they’re facing.

    83
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)UN
    unlawfulbooger @lemmy.blahaj.zone
    Posts 18
    Comments 174