

Well, unless it came back in the last 25 minutes, it’s working fine in Western Australia.
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork


Well, unless it came back in the last 25 minutes, it’s working fine in Western Australia.


Forgive me, but in my opinion, the headline is misleading … at which point in time have any lawmakers anywhere Known What They’re Doing?
So far all I’ve ever seen in the 49 years I’ve been allowed to vote, is short term politically expedient decision making, aimed at getting re-elected (or paid), rather than science based decision making processes aimed at improving society as a whole.


Is it just me, or does that seem … abrupt?


That’s interesting, since my list of addresses contains numerous ones that don’t exist and nobody here has ever used.


Interesting.
I see a list of email addresses.


I am not sure what you are talking about.
I have a domain registered and can see exactly which addresses have been compromised by what, without payment.


ProTip: the Ubuntu version number includes the year and month of release. 26.04 will be released in April 2026. 26.10 in October 2026.
What they’ll do when they hit 2100 is left as a rollover issue for the next poor sod.


ProTip: push your knee(s) against the sink for extra support. Initially you’ll feel a little weird, but you won’t care after your back stops hurting. You can also use this when brushing your teeth and washing your hands.
Source: Taught to me by a physiotherapist who specialises in pain management.


In the vast majority of operating systems the person who installs the system is by default the highest privileged user, in the case of some of those systems, that user is called root.
However, the word root is also used to describe the basis of several file systems.


No.
Secure boot is about trusting which (signed) software is running.
WfW 3.1
This is excellent and important. It also serves to highlight that registrars are making an absolute fortune off the back of this effort.


I’ve been thinking about this for a bit, if all traffic is end-to-end encrypted, the server connecting two endpoints doesn’t have access to the data, so as far as I can see there’s no reason that this couldn’t be implemented using federated services.
I would be surprised if such a service doesn’t already exist, just waiting for widespread user adoption, which undoubtedly relies on mobile phone apps to pass a minimum threshold of viability, something which both Lemmy and Mastodon both struggle with.
The people here today are really part of the early adopters, once you start seeing mainstream media talk about the fediverse, you can expect traction.


And all three users rejoiced!
Seriously, while self-hosting is an option for some, it’s not viable for the vast majority of humanity and unless something revolutionary happens, that’s unlikely to change. Ultimately, technology is complex and our dependence on it will continue to create friction.
As it turns out, not every problem has a simple solution.


Embrace, Extend, Extinguish (Exterminate)
https://en.wikipedia.org/wiki/Embrace,_extend,_and_extinguish
… and this is why we use YYYY-MM-DD as the date format.
Source?
The fact that Debian is not on your list makes me doubt that it’s accurate or complete and while I’ve been using Linux as my primary desktop for over 25 years, I’ve never heard of any of those distributions listed.