

You gotta have your ~/ashdkeuh/


You gotta have your ~/ashdkeuh/


Especially for systems remotely managed by ssh:
~/Desktop/stuff/mystuff/junk/funny/
Sid is a real pain in the butt.
Good looking out. I only saw the one inline with your post body.
You’re on sid, using cosmic and have a read only root filesystem. Is there anything else out of the ordinary with your computer? You replied to another post that you removed additional repos from sources but did you get the ones in sources.d/?
E: sources.list.d, not sources.d
I gotta ask this:
What’s the output of apt —fix-broken install, like the big red error message suggests?
I also gotta ask:
What distribution and release?


MONEY can be spent on GOODS or SERVICES


Nah they’re right.
.mpreg uses a sophisticated algorithm to identify repeated sections of the compressed file and retain only one of each part with a list of pointers to where they go. The single repeated sections are stored inside the end of the file and during the decompression process they’re inflated and passed out of the end of the file (or removed from the file by cutting into the bitstream at their stored location where they’re inflating).
It’s a new technology that has made traditional file creation kind of obsolete. In about a decade there will probably only be mpreg.


Youre working at this from the wrong angle.
You dont know how to judge if something bad has happened. You dont know what to do if something bad had happened. You dont know how to recover from something bad that may have happened.
You do know that something has happened because the computer is exhibiting different behavior now.
You cant know what happened and it’s not worth the time for you to develop the skills and tools to understand or even be able to use systems like virustotal et.al. which might provide some insight.
Stop using that computer. Turn it off.
If you don’t know where your data is saved, figure it out. If you determine that you want to save data off that computer, pull the drive and order a usb to sata or m2 adapter, whatever the drive is. Plug the drive into the adapter and attach it to a different computer, copy only what you need.
Do you have a way to reinstall windows? If not, go to massgrave.dev and figure it out then reinstall windows.
Do you have some system for backing up your computers? Go ahead and test it out now. If you don’t have a system, decide on one. It could be as simple as an external drive you plug in once a week and as elaborate as you like.
Now you have recovered from whatever happened and you have a system and toolkit for dealing with it if it happens again.


First of all: get rid of the broken ones. You’re not doing anything with the running systems, so there’s no need to hang on to the ones that don’t run.
Next, make a list of the things you want to do and start doing them.
If you’re worried about power consumption, don’t be. If you’re still worried about power consumption, get an inline watt meter (a kill-a-watt), take some measurements, do the math and feel at ease. If you don’t feel at ease, look up wake on lan. You can have powered down computers turn back on when they get a packet so you don’t need to worry about power consumption.
When you feel like you’ve done enough stuff, get rid of the computers you’re not using.


Atop, btop, htop, top.
If that’s not good enough sar.
If that’s not good enough, set up cacti.
When you realize none of that stuff is actually helping you, journalctl and grep.


I have both and I use both.
The big benefit from mullvad is that you can get anonymous much easier, it’s easier to ditch an account and it’s harder for you to screw it up. People get mad about proton turning over metadata to authorities or suspending account access but they’re required to do that by law if they can identify the accounts. The structure of what proton offers requires that they have some way of verifying who a user is, so if you’re okay with being able to be identified if someone really tries (or doesn’t really try that hard if you give them payment information or something) then proton is fine for you.
Air is a good cheap vpn for piracy. If you wanna take the maybe smarter route of using separate services for your own privacy and for piracy that’s what I’d do.


Don’t worry about swap, you’ll be fine unless you’re usually working with huge chunks of data like big 4k video files or something.
The firewall built into mint is the kernels included nftables the same one built into Debian and Ubuntu (I think, I don’t fw Ubuntu). It’s fine. Don’t touch it. When you need to mess with it you can figure out how to open ports or split routes or whatever really easy because there’s lots of documentation out there.
Putting everything in your home folder is fine. Programs will install automatically to /bin or /usr/bin or something like that and if you want them in your home directory you could make a ~/.bin/ directory and add it to your path and have your private programs there, but:
Stop using flatpaks or snaps unless it’s your only choice! You have a built in package manager with decades of testing and development behind it and a very capable team of maintainers who watch over the packages, use that instead! That’s why they say not to use the snap store, it’s a vector for using Joes Weird Program that no one has tried before and requires Joes Special Version of a normal system library.
Use your package manager.
You’re not at the point where you understand enough to do the stuff in the linux hardening guide without making decisions that unexpectedly cause you pain somehow. That’s not an insult, sometimes you just don’t recognize the “universal” symbols for engine oil as opposed to coolant and ruin your car by the side of the road because you just don’t know. You can learn that stuff later, but it’s best not to mess with it yet. Speaking of:
If you don’t have a backup solution setup and you haven’t recovered using it and aren’t periodically checking to make sure it’s still running right, turn off disk encryption. It’s much harder, sometimes impossible, to recover data off an encrypted disk. If you don’t have a backup and you don’t know how you’d access the files on the disk without booting the computer then turn disk encryption off.


Everyone, the ops post has been edited and is clear.
Thank you for your attention in this matter.


Man, they out here spackin any old game nowadays.


Op if you like Goldberg so much why don’t you get tazed?


Tell me too, I want to spack my game!


Do update first, do dist-upgrade.
Stop using kali.


Some thoughts on your replies itt:
Pick something and go: you want to move away from capture one, but don’t want to lose the functionality or access to in process edits. Think it over with pen and paper in hand, figure out what you could live without and what you could stand to lose and then choose a piece of software and Just Do It. You’re trying to find a way to keep going the way you’ve been going even though you just said you don’t like it and have prior experience that informed your dislike. Kick the bad habit for yourself.
It’s not as hard as you think: anything on Apple silicon supports running other oses in built in virtualization environment. The thing you feel is too complex literally has first party support. I can say from experience that it works.
You aren’t resilient: it sounds like you don’t have a plan for if your computer were compromised. This is actually a bigger deal than the above. When you get a chance, take the time to figure out how you would recover from some kind of bullshit. It’s worth it.


No worries. It’ll be interesting to see how cert based overlay network setup develops after this, I bet there’s some people willing to leave the plex world and willing to add the polish to it.
Yeah you gotta disable bitlocker.