You are not logged in.
Im reading Dune for the first time, its quite the epic and im drawn in. Ive watched the movie that came out last year but the book is by far superior.
Devuan has a way to go before being a turnkey buntu installation, it does require some prior knowledge all of which is very well documented at devuan.org.
Keine Lust
https://www.youtube.com/watch?v=1M4ADcMn3dA
99 Luftballons - Nena | Karaoke Version | KaraFun
https://www.youtube.com/watch?v=za9NyCCplYY
Take a look here https://www.devuan.org/os/releases
Being a fork of Debian, Devuan would follow as best it can the Debian Release cycle.
Evenson wrote:
Is it really needed to have boot command security=none ?
... was not aware of this extra step.the security module could be apparmor, selinux, ...
ref. https://www.kernel.org/doc/html/latest/admin-guide/LSM/index.html
"Examples include SELinux, Smack, Tomoyo, and AppArmor."
so, security= , requires none.
Thanks, i read up on this today from the link you posted. Ive no need for any of these except yama via sysctl.
kernel.yama.ptrace_scope=2
So if i use security=none it should only be for SELinux, Smack, Tomoyo, and AppArmor ?
Hmm, I thought the opposite
We'll have to wait for the OP to clarify.
Bit of both i think. I was of the opinion that the installer made all free and non-free firmware like network firmware available at install and you had to choose non-free sources to have those packages available after the install. Particularly when using expert installation, im not sure about guided installs?
That's just for the initramfs. Setting MODULES=dep wouldn't cause any firmware packages to be installed or removed.
No that just determines the device drivers to load, not the packages to have available which is what i thought OP was querying?
In any case, I'd agree that apt-get purge apparmor is best here, and that it also seems to need a security=none setting (or similar) on the boot command line to make the kernel bypass apparmor kernel code.
Is it really needed to have boot command security=none ?
Ive purged apparmor, was not aware of this extra step.
I believe it is a setting in /etc/initramfs.conf
#
# initramfs.conf
# Configuration file for mkinitramfs(8). See initramfs.conf(5).
#
# Note that configuration options from this file can be overridden
# by config files in the /etc/initramfs-tools/conf.d directory.
#
# MODULES: [ most | netboot | dep | list ]
#
# most - Add most filesystem and all harddrive drivers.
#
# dep - Try and guess which modules to load.
#
# netboot - Add the base modules, network modules, but skip block devices.
#
# list - Only include modules from the 'additional modules' list
#
MODULES=most
Evenson wrote:the back end requirements, namely polkit and dbus
Sway doesn't require polkit. The Arch package was recently fixed to allow seatd to be used instead. Unfortunately the Debian sway package is broken in this respect. I would file a bug report but I'm not actually using Debian atm.
Im not an archlinux user. So it is broken in debian.
Edit: seatd/libseat reads like a good replacement for policykit.
Evenson wrote:what linux/gnu distribution artemis using? im guessing archlinux?
Looks like she's a Parabola dev. Not sure though.
Evenson wrote:doesn't require obscure methodology to get to a graphical session.
lolwut?
Here's my Wayland session startup script:
exec sway > ~/.sway.log 2>&1
That's it. What is obscure about that? The logging is purely optional, the desktop will start with just sway run from the console (or X session if you want a nested Wayland compositor).
Startup script? Im talking about the back end requirements, namely polkit and dbus. One can do a simple apt depends on sway for this knowledge.
An X11 Apologist Tries Wayland
tl;dr: they were wrong, Wayland is awesome.
I could not find in that article what linux/gnu distribution artemis using? im guessing archlinux?.
I will change over when wayland is usable without dbus and doesn't require obscure methodology to get to a graphical session.
I didnt know that.
So 10th month 24th day, 1024 kb in a MB?
It might be the way you are opening the images. If you open one image and expect to go to the next or previous using shortcut keys that wont work, you need to open a range of images you want to look at, so if you have five images open five at a time and feh will just open them in one window for you to browse using keys or buttons.
I use the example files for keys and buttons like so.
cp /usr/share/doc/feh/examples/keys ~/.config/feh/
# feh key configuration.
# Comments start with a # sign, do not use them mid-line.
# Each line must be blank, a comment, or a key definition.
#
# key definition: <action name> <key1> [<key2> [<key3>]]
#
# Each <key> is an X11 keysym (as output by xev) with optional modifier.
# For instance, C-x would be Ctrl+X, or 4-space Mod4+Space
# Examples for vim-like menu bindings on a qwerty keyboard:
menu_parent h Left
menu_child l Right
menu_down j Down
menu_up k Up
menu_select space Return
# Same for image navigation ...
next_img j Right space
prev_img k Left BackSpace
# and image movement
scroll_up J C-Up
scroll_down K C-Down
scroll_left H C-Left
scroll_right L C-Right
# File deletion
remove d Delete
delete C-d C-Delete
# remove now conflicts with toggle_filenames, so change that
toggle_filenames f
# zooming
zoom_in C-Up f
zoom_out C-Down a
zoom_default d
zoom_fit s
# I only hit these accidentaly
save_image
save_filelist
# This leaves some conflicts with existing default bindings, but you should
# get the idea. And I'm not gonna fix the conflicts, I don't use qwerty ;-)
Got this in my inbox as i subscribe to internet archive, thought some may enjoy this here as a bit of a trip down memory lane. I like looking at the old computer magazines the most.
A Unique Holiday
Happy Day of the Programmer! This holiday comes around on the 256th day of every year (since a byte can have 256 possible values). This year, that's September 13th. To celebrate, we’re sharing some of our favorite collections of computing and software materials; whether you’re a tech guru or a complete noob, there’s sure to be something you'll find interesting!
The Emulation Station
The Internet Archive Software Collection is the largest vintage and historical software library in the world, with over 790,000 titles! Not only is this a valuable resource for those who study the history of computing, but it’s also full of thousands of fun and interesting games and toys. Many of these programs can be emulated right in the web browser, allowing you to see exactly how the original software worked. Take a spin on some of the world’s earliest gaming consoles, or get a new high score on a retro arcade title!https://archive.org/details/software
Printing the Digital
As computers started to transition out of labs and offices into ordinary people’s homes, a new genre of publication arose–the computer magazine. New technology made new consumers, and new consumers wanted to know more about their new purchases, setting the stage for the home computer revolution. Whether they were intended as marketing tools from major brands, shopper’s guides for everyday consumers, or resources for new users, these magazines are a fascinating peek into the early days of personal computing.https://archive.org/details/computermagazines
Tech TV
Our huge video archive contains a variety of materials related to computers and technology–training films, conference talks, event recordings, and even a few broadcast TV shows. Among these is Computer Chronicles, which was on air from 1983 to 2022, and was for a while the world's most popular television program on personal technology. Exploring cutting-edge technologies from online shopping to artificial intelligence, this collection of episodes serves as an excellent introduction to the computers of yesterday.
Hi, joined the forum just now and wanted to ask if maybe the keys should not have an expiry date or is this a security issue if they have no expiry?
Many thanks for the quick fix though.
Edit to add, i found this interesting stackechange post about this, albeit a bit old.
https://security.stackexchange.com/questions/14718/does-openpgp-key-expiration-add-to-security/79386#79386