Consistency with their previous default desktop environment, Unity.
Consistency with their previous default desktop environment, Unity.
Or companies do hire security, but the security team is incompetent and unable/unwilling to adapt to new challenges. Then it devolves into security theater, until either someone new comes who cleans house or a breach happens.
Arch: I need reproducible setups. Also bleeding edge is not for me.
I have to give credit to their documentation though!
What put me off selinux is that the officially documented way of generating a new policy is to run a service unconfined, and then generating the policy from its behaviour. This is backwards on so many levels… In contrast policy-based admission control in kubernetes is a delight to use, and creating new policies is actually doable outside of a lab.
so what are the reasons why it’s a bad daily driver?
Don’t need to go any further than “default user is root.”
Sometimes the X is not quite at the spot. My guess is that it’s under the sand too the right on the first picture (possibly underwater).
WASD = Path of Vampire Survivors?
It was Arkanoid for me.
Alley Cat, Dukem Nukem 3D, Ultima (4, 5, and 7), Daytona, Day of the Tentacle, Zack McCracken…
I don’t recall Reddit having unique content - what I do remember however was that it had aggregated content. It filled the role of Slashdot, Fark, and other sites, and it had a comment threading system that was far more usable. The memes came after.
Legally it is quite clear. Taking a description of a closed source program and writing a new one is ok in most cases (unless that description is API docs - see Cisco vs Arista). Taking a look at closed source software and then implementing your own version is poison as far as OSS goes. OP implemented the first version, so that’s already a problem. They may get away is they describe what the program does to someone else and let them implement it, but OP would not be able to touch the source code
But Jaskier isn’t gay in the show, either. He’s bisexual.
Oh yeah, that completely changes things, and does completely fit in with the character.
I do have to admit that I did not watch the latest season, not because of Jaskier but because of what they did to Eskel in the previous season. So I took the other commenter’s word that the character was made gay. I guess that’s what I get for assuming honesty until proven differently on the Internet.
I believe they’re referring to the character of Jaskier/Dandelion, who in the lore is a womanizing, promiscuous bard. Pretty much the DnD bard player character archetype. It is also pivotal to a number of plot points, because the character’s womanizing habits frequently land him in trouble, making him a “damsel in distress” supporting character. Which in itself works better when the character is straight because it subverts the trope.
The thing is also that there’s plenty of characters in the story who are or could be made gay without serious repercussions to the plot.
You are correct. A little bit hurt maybe to be grouped with the bigots, but as I said I understand the sentiment, and I also understand that in certain demographics it’s close enough to the truth.
As an ally I would prefer if the second panel said “homophobes” instead of “straight people”, but I get the sentiment of the meme. It’s like a Bechdel for the audience.
Take a machine with Linux preinstalled. Will it run Linux without problems? Yeah, of course.
Take a machine with Windows preinstalled. Will it run Linux without problems? Check the list.
The CIS benchmarks for Linux are a good start. There are some off the shelf tools that let you run those, notably linux-bench. Another tool in a similar fashion is lynis. You can also use eBPF tools like callander to examine your workload behaviour and help tighten your seccomp policies.
Once you’ve established a baseline for your system, you’ll next want to harden your environment. This means network scans, OWASP, etc. As far as off the shelf tools go, OpenVAS is quite popular even in Enterprise environments.
Finally there’s the continuous security tasks. Continuous package updates, runtime security, log analysis, etc. There are some free tools that cover part of this like Security Onion, but if the price is right a SaaS tool can save you a lot of time.
It relates to “real” (physical, tangible, immovable or inseparable) property pertaining to land. In other words land plus buildings and resources attached to it. It contrasts with personal property and intellectual property.
data centers
recharge while the computer is off
I don’t know of many data centers that don’t run their servers 24/7
Peter F. Hamilton’s books may fit the bill: Futuristic, not hopeless/dystopic, and the main characters tend to make reasonable decisions. Be wrned though that he favours deus ex machina conclusions. Most will suggest Pandora’s Star as a starting point (with good reason, as the Commonwealth Saga is quite expansive), but it does not have to be. I personally read the Night’s Dawn trilogy first. The Salvation trilogy also stands on its own, and for a completely standalone book Great North Road was a good read.
Adrian Tchaikovsky is another wonderful author! the Children of Time and Final Architecture series were quite enjoyable.
Redemption Space (Alastair Reynolds) is another series one that I like to recommend. Closer to The Expanse. House of Suns also is a great read by the same author, as are several of his other stories.
The White Space books by Elizabeth Bear should be on your reading list.
Vorkosigan Saga (Lois McMaster Bujold) is a bit dated but similar to Vatta’s War in the earlier books. Later on the plot tends to be more along the lines of whodunnit mystery… in space.
And let’s not forget another scifi favourite, Iain M. Banks! The Culture series are great of course, but I liked The Algebraist the best.