One is probably link local the other is global, that’s pretty normal. https://en.wikipedia.org/wiki/IPv6_address#Address_Scopes
- 0 Posts
- 20 Comments
Ah okay, it’s a user unit then. Try the following:
$ systemctl --user enable ydotoold $ systemctl --user start ydotoold
Sadly very typical for science journalists.
It looks like you’re missing the ydotool.service unit file in the package. Can you check by running
dpkg -L ydotool-custom(the name of the package you chose in step 3.4)?Unit files are how services are defined in most Linux-based desktop systems, similar to services in Windows.
hades@feddit.ukto
Linux@lemmy.ml•What are some of your most useful or favorite terminal commands?
2·2 months agoI just press M-.
This may be true, however a simpler explanation is that a lot of people are in relationships, so the prior probability of liking someone who’s not in a relationship is already low. Also it could be that attractive people are more likely to be in a relationship, further reducing this probability.
hades@feddit.ukto
Linux@lemmy.ml•What are some of your most useful or favorite terminal commands?
4·2 months agofzf is great for quickly finding files e.g. in large code repositories.
tcpdump can help diagnose network issues.
hades@feddit.ukto
Linux@lemmy.ml•What are some of your most useful or favorite terminal commands?
51·2 months agotmux is based
hades@feddit.ukto
Linux@lemmy.ml•What are some of your most useful or favorite terminal commands?
25·2 months agoAlso if you make a typo you can quickly fix it with ^, e.g.
ls /var/logs/apache^logs^log
hades@feddit.ukto
Linux@lemmy.ml•What are some of your most useful or favorite terminal commands?
2·2 months agoNumber one will forever and ever be strace
hades@feddit.ukto
Technology@lemmy.world•A Viral Chinese Wristband Claims to Zap You Awake. The Public Says 'No Thanks’English
41·3 months agoThe design is very human.
hades@feddit.ukto
Linux@lemmy.ml•Confession: I don't know what passwords in Linux are for
6·3 months agoYeah, you’re not wrong. What I meant was that polkit is conceptually equivalent to UAC (at least it is supposed to solve the same problem). However it’s not really a fair comparison, as “polkit on Linux” isn’t one concrete thing you can analyse, it’s more of a pile of Lego blocks, which you could assemble any which way. In theory, with Wayland you could build a secure polkit agent that would not allow the malware to interact with it.
In reality this is a moot point, as most privilege elevation is still done via sudo anyway.
hades@feddit.ukto
Linux@lemmy.ml•Confession: I don't know what passwords in Linux are for
3·3 months agoUAC on Linux would require an almost fundamental architecture change, in a way contrary to most of how Linux is used now.
I would say the challenge is not in the architecture, but in the general fragmentation of the ecosystem. PolicyKit is basically an equivalent to UAC, but it’s not used universally by everything that needs elevated access.
hades@feddit.ukto
Linux@lemmy.ml•Confession: I don't know what passwords in Linux are for
36·3 months agoI think the basic premise of this question, that Windows and Linux somehow have a different foundational security model that is or isn’t based on passwords, is not really true. Passwords play more or less the same role for any modern operating system – be it Linux, MacOS, Android, iOS, etc.
The only major difference is that instead of UAC, Linux has a variety of options (sudo, policykit, run0), which are implemented differently across different distributions. If your privileged user doesn’t have a password, in some cases this could lead to any program being able to elevate their privilege quietly, unlike UAC.
However, in many distributions you can set up a user with a password and enable passwordless local login, which would be almost equivalent to windows with no password.
Answering your question directly, the major threat to most consumer users is physical compromise or theft of device. Your statement that “physical access is game over” is not entirely accurate: disk encryption with a password is a very strong protection against unauthorized data access, but you need to use a password (doesn’t matter if it’s Linux or Windows).
Think about it this way: you’re downloading someone else’s code and running it on your system. The OS doesn’t care: it will give it access to everything your user has access to, but won’t give access to anything else.
So (under the caveat below) the software won’t be able to mess with your system because your user generally can’t mess with your system. However, you still need to trust the software, since it will be able to access e.g. your saved passwords, SSH keys, install a keylogger, etc. In comparison, the binary packages can be seen as safer, because they have more “eyes” on them, and there is more time between the code being published and you running that code on your system.
Caveat: if you run something like
sudo make install, then, of course the risk is way higher, and the package definitely will be able to mess with your system up to and including destroying it.
Can you modify the script to release the lock after the process has started?
This is not entirely correct. Many distributions do enable encryption by default. Also, encrypting the /boot partition does not guarantee the integrity of the boot sequence, you need to enable and correctly configure Secure Boot for that.
xmpp is closer to IRC than to modern communications protocols. End-to-end encryption, for example, is an optional protocol extension, which hasn’t even been formally finalized yet (and probably won’t ever be, given it’s been 10 years now)

What features do you need? Just render a string with a given font and that’s it? Or something more advanced?