Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)FI
Posts
0
Comments
415
Joined
2 yr. ago

  • I assume we are talking about an unladen adult rhino... And why didn't they specify the time in some understandable increment, for instance, it will re-enter in the time it would take a normal human to devour 18 triple cheeseburgers from the Burger King in Schenectady NY?

  • I saw that answer and was just offering another option. I am sure xargs might work, but you would need to test as you need a destination passed on each line. Back to my way, I have used it for a lot more than just the move command. I think I used it to do a chmod once where I wanted to check and make sure before I committed to actually running the command(s). You could also use find and the -exec option, which I think was also mentioned here.

    Edit: also, you wouldn't need to check each one, just the first few and last few to make sure the syntax is correct. Maybe do a wc -l to make sure it's got the right number of entries and then let it run.

  • When I run into situations like this, I use the commands that work to write out a script. Eg, in your case the wildcard isn't working with the mv command, so do something like this:

    ls -1 *.jpg | awk '{print "mv "$1" /mnt/example/Pictures"}' > /tmp/movefiles.sh

    Then check the movefiles.sh and make sure it has all of the commands and files properly stated, make that executable, and then run that.

  • I mean they did herd everyone into this situation, and there's nothing we can do about it. I was fine with just paying for XBox Live, which allowed me to play online with my friends. I don't really give a shit about gamepass, and find this to be just corporate bullshit where they get everyone in the same line and then stand around bragging about how long the new line is...

  • I was downvoted to fuck when I suggested this as a conspiracy theory on reddit. One of the reasons I left that place, because of the toxicity. I thought it was a thought that might have had some merit. You don't really know what's behind the glass on that sensor.

  • If I would have said 30 years ago that people in the future would pay money for a device that lets companies basically spy on you, and then they can also sell the data, I would have been branded a lunatic and sent for psychiatric help. Yet, here we are.

  • Was doing two deployments at the same time. On the first one, I got to the point where I had to clear the cache. I was typing out the command to remove the temp folder, and looked down at the other deployment instructions I had in front of me, and typed the folder for the prod deployments and hit enter, deleting all of the currently installed code. It was a clustered machine, and the other machine removed it's files within milliseconds. When I realized what I had done, I just jumped up from my desk and said out loud "I'm fired!!" over and over. Once I calmed down, I had to get back on the call and ask everyone to check their apps. Sure enough they were all failing. I told them what I had done, and we immediately went to the clustered machine and files were gone there too. It took about 8 hours for the backup team to restore everything. They kept having to go find tapes to put in the machine, and it took way longer than anyone expected. Once we got the files restored, well we determined that we were all back to the previous day, and everyone's work from that night was all gone, so we had to start the nights deployments over. I got grilled about it, and had to write a script to clear the cache from that point on. No more manually removing files. The other thing that came out of this for the good was no more doing two deployments at the same time. I told them exactly what happened and that when you push people like this, mistakes get made.

  • I wish I could upvote this comment twice! I have the same feeling about how the media and others keep trying to push this "intelligence" component for their gain. I guess you can't stir up the masses when you talk about LLMs. Just like they couldn't keep using the term quad copters, and had to start calling them drones. Fucking media.

  • Totally agree. Cura has bit me more than once with losing my settings. To Lmaydev's point, it's hard to "back things up" when you don't know where the settings are stored and sometimes you don't know you need to be Sherlock Holmes until it's too late.

  • That is going to depend on what type of access the ftp server allows. If it's anonymous then I would argue that no, you cannot be bound by a EULA if no dialog is presented. But the article mentions "In addition to harvesting data from WorldCat.org, the defendants are also accused of obtaining and using credentials of a member library to access WorldCat Discovery Services." Now it's just my speculation, but if they used someone else's id to scrape the data, then WorldCat can just produce any documents that id agreed to, and it will apply here. Sounds like they done goofed.

  • writeable. AFAIK with bitlocker they are hashed and salted and therefore would be corrupted if you opened again with manipulated data.

    No problem. This part right here might be enough to cause concern. Lets say it isn't a hacker, but just someone dicking around with his linux os, and manages to accidentally write to the bitlocker drive. I don't know enough about bitlocker, but writing random data to an encrypted file is a great way to corrupt it. So if nothing else he could possibly corrupt his work os. And then hope that they buy the old "I don't know how it broke."

    When I was making this all up in my head, I was thinking that if I was a hacker and wanted to just mess with people, I wouldn't need to write a huge os, just overwrite his os with something like a DBAN iso. Something small, but again any tampering with the drive would likely invalidate the bitlocked os. So even just a dd if=/dev/zero of=/dev/{os drive} and that's all she wrote.

  • Here's a scenario for you. His laptop running his linux os gets hacked. Said hacker discovers another drive with windows or an encrypted partition. Now he could sit there and try and de-encrypt it, or if he has the time and inclination just completely overwrite it with whatever he wanted. OP finishes what he is doing and reboots back into what he expects to be his work provided Windows OS, and sees some error message, or maybe nothing at all. In the background the hackers OS which is now running just leads him on while it's doing what it needs to do, like scanning the network it might be connected to. Or prompting him for a id/pw.
    Regardless, the linux os will have access to the drive the Windows os is loaded onto. Now what happens to it may or may not be relevant, but it will be a writeable drive, therefore it will be suspect to manipulation.