- 1 Post
- 45 Comments
Well yes, assuming that:
- you trust the hardware manufacturer
- you can install your own keys (i.e. not locked by vendor)
- you secure your bios with a secure password
- you disable usb / network boot
With this you can make your laptop very tamper resistant. It will be basically impossible to tamper with the bootloader while the laptop is off. (e.g install keylogger to get disk-encryption password).
What they can do, is wipe the bios, which will remove your custom keys and will not boot your computer with secure boot enabled.
Something like a supply-side attack is still possible however. (e.g. tricking you into installing a malicious bootloader while the PC is booted)
Always use security in multiple layers, and to think about what you are securing yourself from.
unlawfulbooger@lemmy.blahaj.zoneto
Privacy@lemmy.ml•Has anyone used Preveil? How is it? Is there any other services similar to it?
5·6 months agoRemember: militaries usually buy from the lowest bidder, so anything military-grade is probably low quality.
Also, email isn’t a great medium for communicating securely, since the other party has to be just as mindful about security as you; otherwise it’s basically security theater.
I get it, sometimes you just do something for the challenge.
It’s really great what you can accomplish when you know a little more than the bare minimum of the tools at your disposal (^^,)
And I had the same experience after learning a bit more about awk for the fist time, hahaha.
Virtual memory is different from swap memory.
Swap memory is used when you run out of physical memory, so the memory is extended to your storage.
Virtual memory is an abstraction that lies between programs using memory and the physical memory in the device. It can be something like compression and memory-mapped files, like mentioned.
And yes, some swap is still useful, up to something like 4G for larger systems.
And if you want to hibernate to disk, you may need as much swap as your physical memory. But maybe that’s changed. I haven’t done that in years.
In the end I’ve used the first command you wrote, because KISS, but I appreciate your explanation
There’s no shame in combining multiple tools, that’s what pipelines are all about 😄.
Also there’s a different tool that I would use if I want to output a specific column:
awkdf -h —output=avail,source | awk ‘/\/dev\/dm-2/ {print $1}’For lines matching
/dev/dm-2print the first column.awksplits columns on whitespace by default.But I would probably use grep+awk.
Sed is definitely a very powerful tool, which leads to complex documentation. But I really like the filtering options before using the search/replace.
You can select specific lines, with regex or by using a line number; or you can select multiple lines by using a comma to specify a range.
E.g.
/mystring/,100s/input/output/g: in the lines starting from the first match of/mystring/until line100, replaceinputwithoutput
The easiest way is probably without sed, which you mentioned:
df -h --output=avail /dev/dm-2| tail -n1But purely with sed it would be something like this:
df -h --output=avail,source | sed -n ‘/\/dev\/dm-2/s!/dev/dm-2!!p’-ntells sed to not print lines by default/[regex]/selects the likes matching regex. We need to escape the slashes inside the regex.s///does search-and-replace, and has a special feature: it can use any character, not just a slash. So I used three exclamation points instead , so that I don’t need to escape the slashes. Here we replace the device with the empty string.pprints the resultCheck the sed man page for more details: https://linux.die.net/man/1/sed
unlawfulbooger@lemmy.blahaj.zoneto
linuxmemes@lemmy.world•I just wanted another folder at /
13·9 months agoIf you’re not already, just erase your darlings.
Then you can preview what files are lost on reboot (see blogpost).
unlawfulbooger@lemmy.blahaj.zoneto
Linux@lemmy.ml•How do you use token to access github in a basic terminal?
2·10 months agoYou can use your token with the REST api. And use that to do whatever you want.
you can also use your token for
git clonelike so:$ git clone https:/git:[email protected]/myown/repo
That would be block storage like glusterfs or ceph, or object storage like minio or rook.
You could also use ZFS to provide PVCs for your Pods, with openebs.
If the mini-servers don’t have hardware redundancy, I’d stick to Replicated Volumes only…
If you go the openebs+ZFS route, you can make a kubernetes service (DaemonSet because it should run on every node) that makes and sends/exposes ZFS snapshots.
Here’s an article that does this: https://iridakos.com/programming/2018/03/01/bash-programmable-completion-tutorial
I have done this for one of my own tools
ta, which is a function that switches to a tmux session, or creates it if it doesn’t exist:# switch to existing tmux session, or create it. # overrides workdir if session name is "Work" function ta() { case "$1" in Work) workdir="${HOME}/Work/" ;; *) workdir="${HOME}" ;; esac if tmux has-session -t "$@" &>/dev/null; then tmux switch-client -t "$@" else tmux new-session -A -D -d -c "${workdir}" -s "$@" tmux switch-client -t "$@" fi } # complete tmux sessions # exclude current session from completion function _ta_completion() { command="${1}" completing="${2}" previous="${3}" [[ "${command}" != 'ta' ]] && return current_session="$(tmux display-message -p '#S')" IFS=$'\a' COMPREPLY=( $(tmux list-sessions -F '#{session_name}' | grep -i "^${completing}" | grep -v "^${current_session}$"| tr '\n' '\a' ) ) } # enable completion for ta function complete -F _ta_completion taUsage
$ tmux (starts session "0" by default) $ ta Personal # create session "Personal" because it doesn't exist $ ta Work # create session "Work" because it doesn't exist $ ta <tab> 0 Personal $ ta P<tab> -> $ta Personal $ ta <tab> 0 Work
unlawfulbooger@lemmy.blahaj.zoneto
Linux@lemmy.ml•Plug-and-play development environment
20·11 months agoArtists will probably have their own setup, software and workflow that they are comfortable with. I’d recommend letting them use their own workflow, and just discussing the interface, so to speak: what file format(s) to use and such. I think GLTF is used for assets, but I’m definitely not an expert.
As for other devs, most required tooling (e.g. Unity or Pycharm or whatever) are one-time installs that you can list somewhere. And language libraries/dependencies are a solved problem (e.g. pipenv, cargo, yarn).
But if you really want to set this up, nix (or lix) is probably your best bet for a total devenv that is exactly reproducible, assuming that works for WSL (or no one uses windows).
Otherwise docker/podman or devenv will probably be doable as well.
Maybe you can use the spicy tape to prevent your pets from eating the cables (assuming that works on them)?
Orher than that, maybe you can setup some metrics (and alerting?) to keep an eye on the diskspace?
unlawfulbooger@lemmy.blahaj.zoneto
Linux@lemmy.ml•Question: Can I use dd to clone my luks encrypted lvm os drive?
2·11 months agoCongratulations!
unlawfulbooger@lemmy.blahaj.zoneto
Linux@lemmy.ml•Question: Can I use dd to clone my luks encrypted lvm os drive?
10·11 months agoTip: don’t use
/dev/nvme0n1directly, but use device aliases in/dev/disk/. I prefer/dev/disk/by-id/but maybe another works better in your case.# find all aliases for nvme drives (no partitions) find /dev/disk/ -type l -ilname '*nvme?n?' -printf '%l %p\n' | sed 's!^../../!!' | sort
unlawfulbooger@lemmy.blahaj.zoneto
Linux@lemmy.ml•[Question] In vim I can't type the ~ character
8·11 months agoTry starting vim without config, I think that’s
vim -u NONEDoes it still occur then?
If not, it’s a config issue in
/etc/vimrcand/or~/.vimrc(or maybe~/.config/vim/vimrcor something?)If it does, it has to be something else.
unlawfulbooger@lemmy.blahaj.zoneto
Privacy@lemmy.ml•why won't Lemmy let me comment or post unless Idisconnecte from my vpn
3·11 months agoOh yeah, hahaha.
Thanks, I’ll fix it.
unlawfulbooger@lemmy.blahaj.zoneto
Privacy@lemmy.ml•why won't Lemmy let me comment or post unless Idisconnecte from my vpn
21·11 months agoIt might depend on the lemmy instance you are posting to (
lemmy.ml) and/or where you have your account (lemmy.world), because I don’t think that this is built into the AP protocol.I suspect at least one of these uses some kind of filtering mechanism that blocks VPN users, like cloudflare’s CDN.
unlawfulbooger@lemmy.blahaj.zoneto
Linux@lemmy.ml•Thinking about switching to Linux; main concern is son's games
5·1 year agoPretty much, yeah.
I’d recommend using two physical drives (SSD/HDD) instead of two partitions if you can, because windows update sometimes messes with the bootloader. But most laptops only have one drive so that’s not always possible.
Do keep in mind that formatting a drive (e.g. to split it in partitions) will erase all the data, so make sure you have backups!
unlawfulbooger@lemmy.blahaj.zoneto
Linux@lemmy.ml•Thinking about switching to Linux; main concern is son's games
66·1 year agoIn the last few years, Valve (company behind the popular Steam PC games store) has made huuuge efforts in making most games work well on Linux, because the Steam Deck console that they sell runs on Linux, and the compatibility layer they made is called Proton.
To check what games work well on Linux you should look in the ProtonDB.
If there are games that only work on Windows, you could do dual booting.
Warning: useless use of cat