Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)EN
Posts
0
Comments
74
Joined
1 yr. ago

  • I've seen a few people with PhD who want to be developers being put into management roles, getting quite unhappy.

    That said, if this type of PhD clearly communicates they want to be developers, the often still get jobs, maybe with lower pay compared to the manager but a bit higher pay compared to the developer

  • In addition to the other comments here: Don't run near cows. Quite often, they will start running with you, which is very impressive and dangerous at the same time. Cows generally are faster than you for the first few hundred meters at least.

  • Except if you ran the update from within a graphical session and your session crashed, as this will kill DNF, making the update incomplete and potentially corrupting files. I recommend you either:

    • use the graphical updaters
    • run dnf from a TTY
    • or use some of the atomic spins, having atomic updates on btrfs subvolumes
  • Syncthing on Android has an option to only sync when on AC battery. The PC client might have a similar option. If not, you could probably configure something similar via systemd or udev under Linux.

    I don't think syncthing has proper means to synchronize contacts or anything else that's not file-based though.

    I use syncthing and prefer it for synchronizing files between my devices.

  • Is this all true for addons available from Mozilla's add-on site?

    PS: Mozilla had to limit installing addons because lots of companies installed malicious addons into browsers of their users, often without knowledge or informed consent of their users.

  • It seems like part of your thinking is: Why would a criminal invest effort to attack an average John Doe? The answer is: With a popular (widely used) operating system, the effort goes close to zero. Attacks can be automated, so they will be. Also, even if they are not interested in your data, they will be interested in other benefits they gain from controlling your computer:

    • Computing power e.g. for Bitcoin mining
    • Your internet connection to attack other computers via yours, taking your computer to hide their identity and location. This is commonly done as DDOS for blackmailing businesses or silencing websites. Or for sending spam or fake reviews.
    • Your identity. If they can get your name, they can order stuff on your name, which will get you a bad credit score or even criminal charges (identity theft)
    • Access to your local network. Many devices are easier to hack via local network access than from the internet. A criminal who took control of your computer could for example take over your "smart" appliances or WiFi printer.