tla

joined 1 year ago
[–] [email protected] 9 points 11 months ago (1 children)

Emacs. Everything.

[–] [email protected] 4 points 1 year ago

+1 for the FOSS philosophy and why that's important when it comes to privacy (ie closed source crypto implementation back doors etc) + full system control, lack of spyware etc. KVM for the VM demo - keep it Linux, right? Introduce the concept of how almost everything in Linux is a file and can be read from / written to. This is important when understanding pipes. Show pipelines - logical && ie cat x | grep y | grep z. Logical || ie grep -E 'x|y|z' Useful commands like top and ps. Explain selinux and why it's a good idea.

[–] [email protected] 1 points 1 year ago

gre implies you want to run dynamic routing over the tunnel but no routing is configured? If you don't need dynamic routing (why would you on a P2P tunnel?) but do want privacy then use IPsec or SSH instead?

[–] [email protected] 2 points 1 year ago

Start with a pre-installed laptop for an easy life? https://itsfoss.com/get-linux-laptops/

[–] [email protected] 1 points 1 year ago

Given the Tory demographic, most of them probably won't make it to the next election so the longer Richi holds out the better. Perhaps a care assistant could help if wasn't for the rabid right saying we don't need carers as a priority group. Imbeciles.

[–] [email protected] 1 points 1 year ago

They're the lying about student loans party.

[–] [email protected] 3 points 1 year ago

Who needs science and objectivity when culture wars and dead cats are available to avoid facts? Ree Lowley knows.

[–] [email protected] 3 points 1 year ago

Ah but but ... "Trickle down economics!" /s

[–] [email protected] 1 points 1 year ago

Tbh that article seems like a sales pitch more than analysis of Red Hat's licensing changes.

[–] [email protected] 1 points 1 year ago (2 children)

You have no control over how an adversary accesses the drive, so no.

view more: next ›