

Linux aggressively caches things.
4 GB of RAM is not running out of memory.
If you start using swap, you’re running into a situation where you might run out of memory.
If oomkiller starts killing processes, then you’re running out of memory.
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork


Linux aggressively caches things.
4 GB of RAM is not running out of memory.
If you start using swap, you’re running into a situation where you might run out of memory.
If oomkiller starts killing processes, then you’re running out of memory.


Look at tailscale.


I’ve been using Linux for 25 years, awk is a more recent addition to my arsenal, but rapidly becoming more and more useful.
For example, awk is extremely helpful if you want to rearrange columns, do math on columns, essentially do things that would take multiple lines of bash with cut and read.


grep, sed, awk, and find


Interesting. TIL. Thank you.
I did discover this collection of tools that appears to provide code signing by the Linux Foundation project:


Why can’t RustDesk use Let’s Encrypt instead?


Source?
The fact that Debian is not on your list makes me doubt that it’s accurate or complete and while I’ve been using Linux as my primary desktop for over 25 years, I’ve never heard of any of those distributions listed.


Well, unless it came back in the last 25 minutes, it’s working fine in Western Australia.


Forgive me, but in my opinion, the headline is misleading … at which point in time have any lawmakers anywhere Known What They’re Doing?
So far all I’ve ever seen in the 49 years I’ve been allowed to vote, is short term politically expedient decision making, aimed at getting re-elected (or paid), rather than science based decision making processes aimed at improving society as a whole.


Is it just me, or does that seem … abrupt?


That’s interesting, since my list of addresses contains numerous ones that don’t exist and nobody here has ever used.


Interesting.
I see a list of email addresses.


I am not sure what you are talking about.
I have a domain registered and can see exactly which addresses have been compromised by what, without payment.


ProTip: the Ubuntu version number includes the year and month of release. 26.04 will be released in April 2026. 26.10 in October 2026.
What they’ll do when they hit 2100 is left as a rollover issue for the next poor sod.


ProTip: push your knee(s) against the sink for extra support. Initially you’ll feel a little weird, but you won’t care after your back stops hurting. You can also use this when brushing your teeth and washing your hands.
Source: Taught to me by a physiotherapist who specialises in pain management.


In the vast majority of operating systems the person who installs the system is by default the highest privileged user, in the case of some of those systems, that user is called root.
However, the word root is also used to describe the basis of several file systems.


No.
Secure boot is about trusting which (signed) software is running.
This is the job for the OS.
You can run most Linux systems with stupid amounts of swap and the only thing you’ll notice is that stuff starts slowing down.
In my experience, only in extremely rare cases are you smarter than the OS, and in 25+ years of using Linux daily I’ve seen it exactly once, where
oomkillerkilled runningmysqldprocesses, which would have been fine if the developer had used transactions. Suffice to say, they did not.I used a 1 minute cron job to reprioritize the process, problem “solved” … for a system that hadn’t been updated for 12 years but was still live while we documented what it was doing and what was required to upgrade it.