Oh man, I’m SO EXCITED for GIMP 3. I’ve been wanting these features in GIMP for literally decades.
I’m Hunter Perrin. I’m a software engineer.
I wrote an email service: https://port87.com
I write free software: https://github.com/sciactive
Oh man, I’m SO EXCITED for GIMP 3. I’ve been wanting these features in GIMP for literally decades.
What I use for a lot of my sites is SvelteKit. It has a static site generator. If you like writing the HTML by hand, it’s great. Also HTML5 Up is where I get my templates. I made the https://nymph.io website this way. And https://sveltematerialui.com.
Backups and rollbacks should be your next endeavor.
If it doesn’t, I would consider that a bug in the router.
Routers are not particularly known for being free of bugs.
Not as bad as promised. I mean he has a point.
Ultimately, you can’t. Even if everything you’re doing is encrypted, they have access to the RAM that’s holding your encryption keys.
It’s not completely FOSS, but I run Port87, which is quite a bit FOSS. It uses Haraka as its SMTP server, SvelteKit as its server framework, Nymph.js as its database layer, Svelte as its frontend framework, and Svelte Material UI as its UI framework.
The ones that I created and maintain are:
The base app layout is also available on GitHub.
You can try them both and see which one you like. Gnome is great, and it’s my preference, but KDE is also great.
Cool, CVEs don’t tell you whether it’s remotely exploitable. What I’m talking about is an issue with the Linux kernel itself that can be exploited without having the existing ability to run code on the machine.
It’s very big news when there’s a vulnerability in the Linux kernel itself that can be remotely exploited. Like, everyone on any security show/podcast/blog is talking about it.
Sure, but those vulnerabilities aren’t just open to the network. Almost every one requires you to be able to run at least unprivileged arbitrary code on the machine.
How vulnerable your system is with an old kernel/old code depends on what you’re running. If you’re running a bunch of sophisticated services that allow access on the open internet, you may have more vulnerabilities than if you’re just running a file share. The kernel doesn’t really matter at all unless either you allow other people to run commands or someone is able to exploit a RCE exploit.
I transferred my entire NAS storage, which includes all of my backups, cloud files, my family’s backups, and my… Linux ISOs. That was about 12TB.
Fuck Apple. They deserve 0%.
Damn, that’s rough. I hope her family well. 56 is too young.
I’ve tried to move as much as I can into Flatpak. That way I can just copy my .var
folder, and all my apps are migrated.
For other things like my configs, I use a git repo.
I use Proxmox for the machine that I use to download all of the Linux ISOs I want. You know, with a VPN, through BitTorrent. Linux ISOs.
Neat. Just in time for the climate apocalypse.
The original 3, “.cum”, “.nut”, and “.orgasm”.
Why do you say that?