Show more

Good is functional and evil is dysfunctional -- evil is not supposed to happen, it's an ongoing exception to good.
But thanks to Jesus, this exception will be erased.

"A compilation of US analog shutdowns from 2009 (multiple POVs)" youtu.be/XbSjD_ov_Wo

Feels sad to watch... I appreciate the robust nature of , always have, always will

The Best of Hack and /: Linux Admin Crash Course is published!

This book doesn't aim to be an exhaustive guide to everything you need to know to be a system administrator. Instead, this book allows me to act as a remote mentor to someone starting out in IT or system administration whether as a full-time job or as a full stack developer.

It's available in premium hardcover, paperback, and ebook forms here:
lulu.com/spotlight/kyle_rankin

I like it when something has the function its appearance suggests.

If you installed a Linux system with disk encryption more than a couple of years ago, there's a decent chance it's using a weak key derivation function and someone who cares enough would be in a position to brute-force it. mjg59.dreamwidth.org/66429.htm has more details and instructions on how to update to a better KDF.

I certainly don't have all the answers, and this is by no means an original topic, but I would like to prompt some thoughts and discussion... There are tons of examples in the bible of giving to the poor and needy, lots of examples of being generous, there is no question that it's a good thing to do... But we don't want to be enabling people to continue in a bad situation, of course the obvious example is them spending any money given to them on drugs and alcohol or whatever... (I've heard that's especially bad here in AK)
I personally believe that the best solution is to give generously anyway (we don't want to make it a test that they have to pass or something) and follow up with spending some real time with them, getting to know their real needs, loving on them, etc. But obviously that takes time, and a certain level of discernment and also some gifting in that area that not everyone has... Another idea I've heard is giving out gift cards, so it's harder to use poorly... But that also limits some level of spicific blessing that we could be... Thoughts?

Why does Ctrl+W (close tab) have to be the same keyboard shortcut as deleting one word on the 😭

Show thread

Don't you hate it when you are typing something long on the , and when you hit submit, there's an error (e.g. timeout) and all your progress is lost? Or, you accidentally close the tab and when you re-open it, all your work is gone?

I was filling in a box with a lot of text, and I accidentally hit Ctrl+W ( users, ya know!!), which closed the tab. The webpage failed to inhibit closing the page or having a draft saved. Ah, well, I lost less text than this post has 😄

Those who think they have the world figured out understand it the least.

We’re at the random parts with wires sticking out dev phase.

Here we’re performing initial crude thermal tests.

Pixelfed is a photo sharing social network, the Fediverse's alternative to Instagram.

You can find out more from the official website at:

➡️ pixelfed.org

The site has a server list and app list (click ☰ if you're on mobile).

The official @pixelfed apps are in public beta testing, and there are third party Pixelfed apps available such as @vernissage for iPhone and @PixelDroid for Android.

You can follow Pixelfed accounts from Mastodon, and Mastodon accounts from Pixelfed.

An improved, I think, version:

Destination:
$ nc -l -p 10002 | pv | gpg -d --no-symkey-cache | tar -x

Source:
$ tar -cv [folder] | gpg -c | nc [dest's hostname] 10002

The `tar` `-v` flag is moved to the source host, so that you can see `gpg -d`'s output better to check that it isn't decrypting bogus publickey-encrypted data.

This uses the `pv` command too, which is optional in the pipeline and is usually not installed. It behaves similar to `cat` but with a handy progress indicator.

@lack

Show thread

Just found out a really neat, convenient way to transfer folders encrypted and peer-to-peer on Unix/Linux.

Destination:
$ nc -l -p 10002 | gpg -d | tar -xv

Source:
$ tar -c [folder] | gpg -c | nc [dest's hostname] 10002

I was aware of something like this before, but hadn't polished it off.

Among the list of reasons modern cars are unappealing to me: in addition to uploading location data, they also sometimes have cameras that upload video to the vendor. In this case employees at Tesla found the juiciest videos and shared them internally:

reuters.com/technology/tesla-w

It is a remarkable thing for a good person to lead a meaningful life in relative obscurity.

“Virgo” is the code name for the laptop we’ll manufacture at our Denver factory. This is the LCD “A” panel milled from thin 6061 aluminum bar stock.

Show more

Ethan Black's choices:

Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml