

grep, sed, awk, and find
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork


grep, sed, awk, and find


Interesting. TIL. Thank you.
I did discover this collection of tools that appears to provide code signing by the Linux Foundation project:


Why can’t RustDesk use Let’s Encrypt instead?


Source?
The fact that Debian is not on your list makes me doubt that it’s accurate or complete and while I’ve been using Linux as my primary desktop for over 25 years, I’ve never heard of any of those distributions listed.


Well, unless it came back in the last 25 minutes, it’s working fine in Western Australia.


Forgive me, but in my opinion, the headline is misleading … at which point in time have any lawmakers anywhere Known What They’re Doing?
So far all I’ve ever seen in the 49 years I’ve been allowed to vote, is short term politically expedient decision making, aimed at getting re-elected (or paid), rather than science based decision making processes aimed at improving society as a whole.


Is it just me, or does that seem … abrupt?


That’s interesting, since my list of addresses contains numerous ones that don’t exist and nobody here has ever used.


Interesting.
I see a list of email addresses.


I am not sure what you are talking about.
I have a domain registered and can see exactly which addresses have been compromised by what, without payment.


ProTip: the Ubuntu version number includes the year and month of release. 26.04 will be released in April 2026. 26.10 in October 2026.
What they’ll do when they hit 2100 is left as a rollover issue for the next poor sod.


ProTip: push your knee(s) against the sink for extra support. Initially you’ll feel a little weird, but you won’t care after your back stops hurting. You can also use this when brushing your teeth and washing your hands.
Source: Taught to me by a physiotherapist who specialises in pain management.


In the vast majority of operating systems the person who installs the system is by default the highest privileged user, in the case of some of those systems, that user is called root.
However, the word root is also used to describe the basis of several file systems.


No.
Secure boot is about trusting which (signed) software is running.
WfW 3.1
This is excellent and important. It also serves to highlight that registrars are making an absolute fortune off the back of this effort.


I’ve been thinking about this for a bit, if all traffic is end-to-end encrypted, the server connecting two endpoints doesn’t have access to the data, so as far as I can see there’s no reason that this couldn’t be implemented using federated services.
I would be surprised if such a service doesn’t already exist, just waiting for widespread user adoption, which undoubtedly relies on mobile phone apps to pass a minimum threshold of viability, something which both Lemmy and Mastodon both struggle with.
The people here today are really part of the early adopters, once you start seeing mainstream media talk about the fediverse, you can expect traction.
I’ve been using Linux for 25 years,
awkis a more recent addition to my arsenal, but rapidly becoming more and more useful.For example,
awkis extremely helpful if you want to rearrange columns, do math on columns, essentially do things that would take multiple lines ofbashwithcutandread.