

I was thinking the clip was the update.


Hmm, you are right. I was thinking of flatpak. I had made it a habit to avoid those formats way back in my slashdot days and never revisited it.


I briefly considered Zorin and Bazzite on my journey from Mint. I dropped Zorin I think because I was looking for something that was on a newer kennel to support my new graphics card.
Bazzite I dropped because I think it looked like it was all snaps.
Running Fedora now. It’s a far stretch from the Red Hat I played with 20 years ago. I think after running Mint for so long,


Leftists in USA do need to band together, and I feel like it is more difficult to do so because of our individually. Most of our goals are common.
Doesn’t bother me.



I want to be clear that what I’m about to say only refers to compromised systems where the password database has already been exfiltrated and systems that do not lock or otherwise slow down attackers.
A system where the passwords are inaccessible, requires periodic password changes, enforces complexity, and locks out invalid attempts probably is fine, but I’ll get there.
A password cracking tool will typically start with lists of known passwords, then it will move on to dictionary words. If the attacker has any personal information, and the means to add it, they will give priority to that information. Phrases with multiple words are more likely, and will be tested next. These dictionary attacks are run first because on a fast enough system they can crack a password in weeks. Munging standard spelling increases the entropy here, increasing the number of attempts to guess a password.
From here, an attacker must start brute force, which tries to decipher your password one character at a time. Adding uppercase characters doubles the number of characters, but that is still super quick to crack. Adding numbers begins to increase the time, but all this is going to be checked within hours or days depending on the length of the password and the resources the attacker is committing.
Adding special characters significantly increases the amount of time because just the standard (33?) characters characters easily accessible on a common US Qwerty keyboard multiples the checks that many times, per each character in the password.
So, uncommonly misspelled words and sprinkled in characters increase the security of your accounts over just dictionary words. This would guard a person’s reputation at work if anyone got their company’s AD password file out without notice, as well as one’s security if their browser’s password store is compromised. Also, some people refuse to follow proper security for convenience, and it is sometimes possible to find a service that will allow rapid password attempts.


That baby is going to die so many times.


If you have a password vault, use the vault first.
For rotating PC login credentials, I use codified passphrases. They typically meet security needs, are unique and nearly unguessable because it could be ANYTHING in your office, and don’t contain dictionary words. Example:
Annual evaluations are due before summer. Be sure to mention the Grodsky project! aeadB4S.Bs2mtGp.
Where did Julie’s candy go? I ate it! She’ll never know >:D
WdJcg?I8i!Snn>:D
Even if I had a perfectly secure connection, I’m still getting a password from a service that could be tracking me.


Run a PowerShell script from batch, but call it using start-process as administrator, using a variable for the path and also pass parameters to the script.


OP missed two periods. One way or another, a failed test is due.
Coffee really does make it hit faster.
https://en.m.wikipedia.org/wiki/Rice_burner
Customizing a machine is often known as ricing. People want to use it innocently enough, but the history taints the expression.
Looking at the stereographic projection, there is a longer distance between points the father you get from the center of the map. Although the latitude lines remain circular in a polar projection, the map scales to avoid distortion father from the constant growth of the map once you leave the projected hemisphere. The northern hemisphere in an artic projection still must distort, making geometry a mess.
Goode homolosine projection is closer to keeping that distortion down, but all maps are an estimate due to the way a 3d curve is translated to a flat surface.
All that said, and I know I’m being pedantic, you could come really close by calculating the center of the circle in a sphere, then projecting the map stereographically from the center. That specific projection would come the closest, given the irregular shape of the Earth.
All map projections are arbitrary. The only way to do this is on a globe.


The two reasons to run proxmox here are one, to create external snapshots and two, to allow multiple operating systems to share your workstation. I keep a virtual Windows install for random windows os stuff on the same server.
If you are not getting the benefits of virtualization, then it makes sense to run bare metal.


I bought my power supplies off temu. One way or another, someone is getting hurt.


They should be optional, just like power cords.
My environment is at a lack for cables, for administrative reasons, except for power cables.
Pop ate punk.