

If you open your CPU up to a jailbreak by being a dumkopf, does that really count as Open Source?
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork
If you open your CPU up to a jailbreak by being a dumkopf, does that really count as Open Source?
The boundary of where to host what, is not fixed. You cannot host the internet at home. Where people sit on the spectrum varies depending on skill, resources and need.
I highlighted several options that provide a solution for someone with limited skills and resources.
You could host a CALDAV server or a next cloud at home and use the suggestions I provided, or you could use those hosted by someone else.
My answer was to provide ideas, not a how-to guide, answering, in my opinion, exactly what OP was looking for.
That it doesn’t match your idea about solving the problem tells you that there are many ways to solve software problems. My suggestions had a low barrier to entry.
What’s your recommendation for OP?
Google Sheets will be a simple solution you can do for free.
The app “Track & Graph” is another.
I have been logging all my medical events using Tasker and a Google Calendar. Analysis is manual using graphviz.
This sounds like a trap.
It’s free unless you fail the test.
I rarely use a docker container in production that I didn’t write the Dockerfile for. Once you understand how it works, you can write your own and install exactly what you want in the way you want it.
I’m familiar with Linux, having used it daily since 1999.
I’m referring to the research about tech workers thinking that MacOS is based on Linux.
What I find more shocking about this assertion is that I have no facts to back it up, but I believe it, and I’m not surprised.
Of course someone here has a link to some actual research … right?
When you pipe the output, it’s a single shot, no dynamic updates.
The top
command will tell you what each process is using in terms of CPU and memory. You can log this to a database and analyse it as required.
I’d be surprised if the Android battery application was anything different.
Except that the idea is that you cannot get data in or out of the corporate network. Depending on how it’s implemented will determine how successful that is.
Regardless, you’re likely to lose your job if it’s detected without written permission and even then it’s likely to turn into a security pissing match.
From having played with the remote desktop offering from AWS, it’s a Windows Server running a terminal session. It’s likely heavily locked down and on its own network with likely no inbound network connectivity.
Similarly, the compute nodes are likely to be locked down to only accept connections from the remote desktop network.
It all depends on what the brief was to whomever set it up.
You might be able to do some shenanigans with the web browser on the remote desktop, but for my money, I’d just open your browser, set it to full screen and forget about how your keystrokes are travelling.
Ultimately, unless you’re a shareholder, it’s their money.
And for the record, it might be that the IT department doesn’t want you to run your own SSH session for a bunch of very good reasons.
I have no idea what Bazzite is.
The error says that there’s a missing file. If it used to work, but after you updated, upgraded, compiled, installed or something to get a new kernel, it broke.
I’m guessing that you installed the wrong kernel or didn’t update the initial ramdisk correctly.
You might be able to boot using the previous kernel, but I’d start with trying to figure out what you did to get here.
You should be able to boot from the installation media in rescue mode to fix this, but that won’t happen until you know what’s broken.
It seems appropriate to describe Facebook itself as a cybersecurity threat because of the OS platform it runs on. Perhaps they should also ban all the technologies named on this page … just to be safe.
I think that what you’re looking for is “CPU affinity”, but that is not something I know anything about.
In the 40+ years I’ve been playing with computers, I’ve always let the OS worry about where and when to run a process and only rarely do I renice
a process that needs to run, but not at the expense of everything else.
A Docker container is a security framework. The process running “inside” the container is just a Linux process like any other.
So, as I understand it, the performance will be identical to a process that is running “outside” a container, subject to the overhead associated with any security restrictions.
To answer your post title question, I suspect that at this point it seems counterintuitive to introduce complexity in an environment already rife with exploits.
It’s not like it’s a new idea either. Microsoft published research on this in 2009, 16 years ago.
The abstract on that link holds the promise of many benefits, but it appears to carefully avoid specific claims, which makes me wonder if the idea ran into unexpected hurdles, which is common in software development.
The abandonment of the Barrelfish project is probably an indicator that this is an idea that didn’t pan out.
Having said that, I haven’t dug into kernel development over the past 40 years of my career, so it might well be that aspects and nuances of this idea were adopted and are in common use.
If you run dmesg -T
you can see the entire boot log with human readable timestamps.
TL;DR - Essentially you’re attempting to mix two types of output, a pipe with a terminal. This is pretty much not going to work as expected.
To make colour in a terminal, commands like ls
add so-called Escape sequences, a series of bytes that your terminal knows how to interpret as colour.
Whilst you might be able to force those characters though a pipe, they’re just characters, so if you only grab part of those characters, you’ll create invalid Escape sequences and all hell will break loose, exactly like what happens if you run cat
on a binary file and the terminal display goes haywire. You can often recover using the reset
command.
This is why programs like ls
and grep
detect if they’re running as a terminal command or a pipe command and suppress the Escape sequences when you are sending their output to anything other than a terminal.
Skirting the edge of self hosting, I was faced with this question last month. I ended up with a Ubiquity UCG Ultra. It has all the network management tools on-board and for the first time in a long time I can manage my network from anywhere on the planet.
Access can be via a web UI, or an app.