chellomere

@chellomere@lemmy.world
3 Post – 47 Comments
Joined 1 years ago

Turkish:

Left: sol, right: sağ

I'm running ZRAM on my old Netgear ReadyNAS's, which has 512MB or 256MB RAM. It enables them to do a lot more than they otherwise would be able to, running a modern linux distribution.

I've been so satisfied with it that I even started running it on my modern desktop with 32GB RAM, it helps with my tab addiction :)

9 more...

Under Santa's hat

I think if they just filled the alt= attribute with the emoji this would copy fine.

What a time to be a predator

3 more...

That's why we use Linux, free software and no cracks

I float!

No, via a special adapter that enables you to connect a GBC to a feature phone.

European here, I suggest Bosch or Electrolux, if that's available in your part of the world.

2 more...

Not so sure. What if these 4/5 nukes explode on the launch pad? Even if this is in a remote area you'll cause some damage to your own country.

4 more...

I've been running Debian stable with unattended-upgrades on servers for years and have had no issues whatsoever.

2 more...

Gen Å

2 more...

Solid explorer is great. One of the few apps I bought.

separate processor with hundreds of cores

Well, graphics rendering is very suited for parallelism. That's why GPUs were invented.

Most other tasks are not. Most of the cores in a 128-core JPU would end up being unused. Also why JPU? It's not like it's significantly different from a normal CPU task.

I think you commented on the wrong post Edit: nevermind, these are spam links that they bypass the spam filter by starting with some random text.

I'm having a hard time understanding how this would work. udev will load kernel modules depending on your hardware, and these modules run in kernel space. Is there an assumption that a kernel module can't cheat? Or do they have a checksum for each possible kernel module that can be loaded?

Also, how do they read the kernel space code? Userspace can't do this afaik. Do they load a custom kernel module to do this? Who says it can't just be replaced with a module that returns the "right" checksum?

4 more...

Meow

I looked up the backgammon start position, since then all Google wants to sell me is backgammon boards.

Wow, I have TMJ but didn't know it's called that. Basically, the jaw joint clicks when eating certain foods. And I have bruxism and occasional tinnitus. Didn't know the connection, thanks for clearing it up!

TIL that it's called a charley horse in English

Looks like real hands but not her hands

It's also possible to read it in the Liftoff app by accessing the so-called "Nerd stuff" of the comment

These are Android API levels: https://apilevels.com/

3 more...

It is a god send.

Did something similar recently. Turns out rsync by default, if it encounters a symlink to a directory and it's instructed to copy a directory with the same name, will remove the symlink and create an empty directory.

So I had a script that installs crosscompiled kernel modules via rsync /path/to/nfs/path /

This worked perfectly until Debian 12, like other distros, decided to merge /usr, so now /bin is a symlink to /usr/bin. First time I run the script after upgrade /bin gets replaced and then no programs can be started as all binaries look for /bin/ld-linux.

I managed to fix it by booting into busybox and recreating the symlink, but it took a while until I figured out what was wrong, wasn't familiar with usrmerge.

Ah, so they don't actually say that they read kernel space. They check the version of all installed packages and checksum the installed DLLs/SOs.

If the user still has root privileges, this may still not prevent sideloading of kernel modules. Even if it would detect a kernel module that has been sideloaded, I believe it's possible to write a kernel module that will still be resident after you unload it. This kernel module can then basically do anything without the knowledge of userspace. It could for example easily replace any code running in userspace, and their anticheat would miss that as it doesn't actually check what code is currently running. Most simply, code could be injected that skips the anticheat.

Of course, in their model, if a user isn't given root privileges it seems much harder to do anything, then probably the first thing you'd want to look for is a privilege escalation attack to obtain root privileges. This might not be that hard if they for example run Xorg as it isn't known to be the most secure - there's a reason there's a strong recommendation to not run any graphical UI on servers.

Another way if you don't have root is to simply run the code on a system that does but that does have such a kernel module - or perhaps modify the binary itself to skip the anticheat. I don't see anything preventing that in their scheme.

Services are automatically restarted. There is no automatic reboot by default, but that can be enabled if you really want to. Otherwise it'll keep track of whether a reboot is necessary or not.

I don't really tweak much. I use the Debian default of 50 percent RAM used. For the NAS's I tell it to use lz4 as they're pretty weak cpu-wise.

Be bedebe bedebe bedebe

Agree with you fully on the shortcut front, and it's very confusing that ctrl is separate from the command key. The whole keyboard layout is also a nightmare, but this is probably because I'm in Sweden, where the Swedish mac keyboard layout is radically different from the normal Swedish keyboard layout that all other computers use. When I help out someone with programming on a mac, I always end up telling them "please press pipe" or tilde, braces, backslash, or even at-sign, as these are not printed on the keys. They are accessible through the option key, but you'll have to test all combinations to find which one is where and memorize this.

It doesn't work like that in a state run like Sweden. The government can't decide in areas like this, it has to go through the parliament.

In Swedish we spell it text.

1 more...

No, because it's UB, the compiler is free to do whatever, like making demons fly out of your nose

What they say for horses is that if you're going to walk behind one, stay just behind it. That way if it does decide to kick you, the legs won't be able to build up momentum and will be mostly vertical before hitting you. Under no circumstance walk 1-2m behind it, you can die if it hits you in the head.

Apply at your own risk to cows.

rsnapshot

For example, maybe branching is something you'd like to be able to do without it being a nightmare?

I had this and really liked it! The physics engine was craaazzyy 😂

They actually call the android releases "cookies" because of this tradition for the code names. You can read phrases like "This will be fixed in the next cookie"

You have nethack messages activated?

Yes it does, I use it all the time