This is the way!
Way simpler than using any GUI tool or somehow recreating the partition and manually copying the files.
This is the way!
Way simpler than using any GUI tool or somehow recreating the partition and manually copying the files.
Not sure if i understand the request, but there’s the [email protected] community if you’re looking for open signups.
I’m gonna be honest: I’ve been skimping on anti malware since i moved to Linux.
Still keeping up the common sense part about running code you don’t know and running untrusted code and weird URLs in a virtual environment (well, except for the AUR perhaps), but I only scan for malware once or twice a year, if at all.
Actually, I just did a scan with RKHunter which came back clean except for the usual false flags, which I find mildly suspicious as one would imagine there to be some malware with all the small time programmers and script kiddies in the Linux community.
What are you using as anti malware? Anyone knows of good methods for set-and-forget or some good GUIs for easy containment management, scanning, and whitelisting? It can’t be that ClamAV, RKHunter, and chkrootkit are the only halfway decent AVs out there.
Huh? That’s quite interesting.
I’ve been running a hacked-together script which uses a disembodied copy of Proton 8 (aka. copied to a portable drive, doesn’t need to have Steam installed to run) to launch my games from Itch and GoG.
Hmm, just tried to use Proton 9.0-2 and the current experimental in my steamapps (which appears to be version 9.0-202), and it works just fine. Though, I guess Lutris’ implementations are quite a bit more advanced than my hacks (no debugging let’s goooo).
A very simplified version of my script, for those who might be interested: pastebin.com/kbNNvzAx. Don’t forget to uncomment game_exe
and set it to your executable - won’t work otherwise.
Also, pinging @[email protected] in case of interest.
I guess you could also ask: “Does the pro-tier give one any options/additional functionality that the non-pro/non-donation tier doesn’t?”
Obviously, if you have to pay for additional functionality (like settings/themes/updates) then it isn’t a simple ask for donation. Though, I’d argue to ignore trivialities such as “thank you”-emails and possibly a small visual-only token on the program that you paid/donated, as those barely count as “functionality”.
The absolute ridicule! I’m sorry, but I might not survive this! How could this come to be?!
Nuh-uh, I saw a Steam survey that said that less than two percent of computers use Linux!
What do you mean by “the headless internet backbone servers, Android phones, and smart appliances don’t have Steam”?
Yup, our everybody’s dear Ursula. I realize that Europe has many institutes and multiple unions, but I feel that the EU best represents Europe as a whole. And, of the multiple bodies the EU is made of, the European Commission often lays face to news and is said to hold the most “power”.
Yes, the USA is a master of making itself seem much more powerful and important than it really is, and what do news outlets love more than painting the devil onto the walls? Denmark living in the USA’s pocket doesn’t help much either.
At this point I wouldn’t be surprised if more Europeans know the presidents of China, Russia, and the USA than know the name of our own European prime minister, which would be pretty sad if actually true.
Of course it’s important to know what other countries are up to, and the EU is currently reliant on the USA for conflict handling (please make a joint European army), but unless you plan to intervene then I see no reason to fanatically follow their politics. Just tell me whether we’ll have to deal with some ancient inept dude, or another ancient inept dude who has managed to weaponize incompetence.
Welcome to my rock, i guess.
I’m vaguely aware that the USA is gearing up for another political tragedy, but who, living outside of the USA, actually follows that stuff? Can’t influence the outcome much either way if you can’t vote, except perhaps by spreading propaganda.
Hope the preview works right.
Yeah, I’ve been bamboozled by this before. Found out that both “dike” and “dyke” mean “water barrier” but also can be slurs.
I guess it depends on context and audience, though, I hope the context is clear in this case. :P
Edit: Also, “dam” doesn’t fit since it’s an island and not a river or lake. The island does have dams, but those are not nearly as important as the dikes.
The Baltic sea just had a once-in-a-century storm surge this fall. There was little danger since the baltic sea is rather well protected, but many local dikes weren’t up for the job, resulting in quite some damage (in general, the houses on my island were mostly unscathered).
Took us the better of two months to drain the water from the island, and in the meantime we had to hike along the more robust dikes to get to the harbor.
We also had to empty our lakes of saltwater to attempt and save our fire-bellied toads, as the Copenhagen Zoo is trying to preserve the species on the island.
This is the way! The razorblades last for about 4 uses (7 if stretched) so a pack easily lasts a year, and I haven’t cut myself with one yet (in contrast to those pesky plastic razors which can’t keep sharpness throughout a single session).
Never gonna give my safety razor up, one would have to wrestle it out if my cold, dead hands!
Everything nowadays that attempts to give back a little autonomy or freedom to the user is called piracy.
As long as an app could theoretically be used for piracy, even if it was made to circumvent toxic behavior of users’ bought and paid for products, then it must be properly labelled as piracy and taken down.
I’ll better stop before this becomes a rant.
The video’s title is rather unfortunate, given the recent presence of the anti-Linux bandit on Lemmy.
That said, going by the comments on yt it might be an interesting video with a misleading title.
Ideally, a .mp4, or any other non-executable file format, would not be able to execute rogue code on your computer, but the programs you use to open the files with might have security flaws which allow rogue code execution if done right.
You might have a hypothetical file, which might not be dangerous if opened with VLC, but which exploits a flaw in, say, Windows Media Player version x.y.z to execute a payload.
Sorry, for not including any examples, I’m currently not at the PC.