Noob Question Thread: Ask Any Questions About Linux!
bloodfart @ bloodfart @lemmy.ml Posts 1Comments 1,371Joined 2 yr. ago
That sucks. I’ve done that a lot of times by either not understanding what I was doing or fat fingering some decision.
If you do decide to try again, tag me and I’ll set up a vm environment similar to yours and walk you through any confusing steps.
I don’t, but there’s lots of reasons people do it, there might be additional costs associated with it but everything I’ve heard of it that the person in charge of the trust just pays the property tax like if they were a normal person instead of the agent of a vehicle.
One benefit to a trust it that transfers take place entirely within the framework of the trust, so you can transfer use rights and “ownership” within the trust without incurring the transfer fees and taxes associated with splitting up a plot in the “meatspace” of titles and deeds.
Everyone is saying yes.
They are wrong.
You will absolutely have to troubleshoot in order to figure out how to do what you want to do.
Linux is different than windows or macos and you’re gonna have to gain an understanding (however dumbed down you might describe it) of those differences in order to use the computer.
If you can get over that hump of understanding then I think you’ll be fine.
I meant to write socket instead of port because I was tired.
If for example a program can take rpc over a socket which is a file somewhere is it just the filesystem permissions that determine what can be done or is there more at play?
Can a windows boot usb also not read them? If so and if you have the space to do so, it’s worthwhile to backup, reformat and repopulate the unreadable drives.
If Unix permissions don’t work for you, acls are the next logical step.
Land can be held by a trust
You just use the same phone numbers and accounts and stuff. There’s been standard ways to redirect people to new names for at least centuries.
It costs a couple hundred bucks to start a new llc in most states. People just use their old articles of incorporation and change the names (I know one who just crossed the old ones out with a pen and wrote the new ones in over the top).
Permitting almost always has exceptions for existing operations.
When you close a business on paper you don’t suddenly lose access to services in the name of that business.
If you can figure out a good reason to (any reason counts, restructuring, etc) you can have the same dba filing for your new company, not change anything externally and be fine.
What you’re not considering is that all of the above things might amount to five grand if you live in a particularly restrictive state, but that’s still 45k in tax breaks a year and if there was some reason to restructure internally now you’re getting paid for it.
It used to be that someone with midi controllers could be assumed to be technical enough to say “you’ll be fine, everything will work”, but most of the time nowadays software just automatically figures out stuff and you don’t have to go looking at the implementation chart and using midiox to see where you’re screwing up,
So,
I’ve never seen an interface that didn’t work, but if you’re not comfortable troubleshooting midi signals then give it a shot and see.
What are you using midi for, a daw?
If you can boot back into windows, turn off quick startup/shutdown, run chkdsk or whatever on the drives, reboot back into windows then boot back into Linux and you’ll be okay.
Quick startup is a kind of weird sleep/hibernate mutant that leaves drives in an unclean state when it turns off, so the Linux drivers for ntfs say “I’m not gonna touch that possibly damaged drive”.
The language you want is “nonfree” in Debian derivatives.
Someone else wrote about how you’ll have a problem creating feature parity and integration like apple services. They’re right.
A better idea is the thing everyone always says: make a threat model.
The easiest thing to do for an Apple user is to simply make an iCloud recovery key, turn on advanced data protection and remove any account recovery method other than the key.
I would also gently counsel against trusting prismbreaks recommendations without research as they still point people at federated services where any bad or coerced administrative actor federated with the target users platform has access to a huge swath of data that most users would put in the category of “private”.
I see you’re unfamiliar with small businesses
One of the best reasons to not vote anyone ever gave me is that if you stop before you move your home address isn’t a matter of public record anymore.
eh, if you don't have spinrite or something like it and don't wanna wipe your device with dd then it works well for the purpose of renewing ssds.
with the -n flag it will probably help and shouldn't cause any damage, assuming the problem is that you have an old clapped out ssd.
remember, you'll have to run it from a usb boot or something.
Always have a backup.
Badblocks shouldn’t output anything when run on an ssd. It’s not really useful for its intended purpose there because ssds have hundreds to thousands of bad blocks to start with (depending on how you define “blocks”) and reprovision messed up sections all the time to cover up the fact that they’re screwing up constantly from the bus.
It’s also true of rotational hard drives nowadays, not that they’re fundamentally based on using a medium that’s incredibly prone to “failure” but that they don’t expose the actual addresses on the medium to the controller.
The old way, what the bad blocks tool is intended to address, is like if there were a big warehouse and when you wanted something you asked for the thing in rack 6F, shelf D8. The disk goes and gets it for you and if it’s the right thing then you’re golden and if it’s wrong you got a problem.
Badblocks -n grabs the thing on 6F,D8, sets it aside and asks the disk to put something else in there, then asks for it back. If it succeeds then wonderful! “Block” 6FD8 is good and it puts the thing that was originally there back and moves on to the next one ad infinitum.
Of course, new rotational disks and all available ssds don’t actually work like that. You hand the disk an object and say “put this in 6FD8” and the device says “you got it” and then promptly opens the package you handed over and puts its contents wherever it wants.
When you ask for 6FD8 back the device grabs all the stuff that’s supposed to be there, puts it all back together and hands it to you. The disk itself might have all kinds of messed up things going on internally and you only see it when the data you put in doesn’t come out the same.
Part of what makes the secure erase functionality work on ssds is that very insane obfuscation. When there’s no actual physical structure to the way data is stored, no “raw” read of the ccd chips can make heads or tails of it. The disk can be easily and quickly “wiped” just by asking the disk itself to kindly forget its own key used to locate information requested and viola! Secure erase!
Of course, none of that matters because we’re not using badblocks to figure out if there are bad blocks, we’re using it to force the ssd to rewrite its ccds so they respond to requests faster.
The behavior we care about is writing something to the “block” then erasing it and rewriting the original data into it. Badblocks -n should do that.
There are times when it might not though, the ssd may hand you porno.mov out of “6FD8”, write random data to somewhere in the ccd chip that it writes down is supposed to be 6FD8, read it back to badblocks, then when badblocks says “alright, that one passed, lets put porno.mov back there” the ssd says “wait a second, I have a string of bits that matches this!” And just update its internal ledger that 6FD8 is now what it was before that silly random data kerfuffle, never actually rewriting anything.
It saved a write cycle on those cells after all! It did you a favor!
So sometimes badblocks -n doesn’t work in this application. Spinrite is the “correct” tool, but for some applications it doesn’t work either (non x86 systems) so I use dd in that case to just slam the disk full of something so it can’t reprovision and save any write cycles and writes every possible cell with something. That destroys data, of course.
It’s amazing how powerful a real workstation is even from fifteen years ago.
I got one!
What constrains access to an rpc socket in the file system? Is it just the permissions of the socket or is there more to the whole process?
E: I originally wrote port instead of socket because it was early lol.
How does that saying go? “If ballot access were candy and nuts we’d all be eating steak!”
There are absolutely ultras in America but it’s not a position necessary to recognize that the Green Party isn’t leftist. I’d say at the very least the greens can’t be called leftist for the same reason the dubious moniker “progressive” isn’t any marker of the same: their platform is explicitly not left.
Ty!