• 5 Posts
  • 18 Comments
Joined 1 year ago
cake
Cake day: June 19th, 2023

help-circle






  • PlutoParty@programming.devtolinuxmemes@lemmy.worldIt's OK if you cry
    link
    fedilink
    arrow-up
    2
    arrow-down
    2
    ·
    11 months ago

    This is true today. Had you tried that back in 2005, you’d very likely be fiddling with drivers. I specifically remember making a disk that contained all the drivers I’d need if I had to reinstall for any reason. Without it and without a network, you’d have to have another computer available to grab drivers from the internet.





  • I just spent a little bit checking out suckless.org. I had heard of st before, but never really gave it any serious thought. I’ve been using terminator for a very long time. I’ve liked it because of how easy it is to split and add more terminals. That makes it easy to monitor a lot simultaneously. terminator is mainly why I’ve never taken the time to memorize or use the panes and windows shortcuts with tmux. However, I think I’m a new fan of st now that I’m looking at it and just tried it out. Just a stupid simple terminal that works. Love it. The ability to split terminals with terminator is a little redundant when I end up attaching to tmux anyway. Plus, I’d save time just keeping my views persistent with tmux instead of pulling each one up independently. That does get annoying. Not to mention all the other features of terminator are way too much bloat for me. st + tmux combo looks perfect and I think I am going to give it a fair shot as my primary daily driver.

    Thanks for sharing. Gaining insightful info like this is the whole reason I’m taking the time to write such posts. Now I might be sucked (hehe) into trying out their windows manager, too.







  • I think when people say it is a smaller target for virii, they are talking about an actual virus such as ransomware, crypto miner, adware, trojans, etc. I have zero doubt these types of virii are more targeted on Windows platforms. Linux servers on the other hand are indeed going to be the largest target for exploits. The primary mechanism by which a Linux server is compromised is going to be via an exploit, not an actual virus. That’s not to say they don’t exist. I administer hundreds of Linux servers in several data centers. I don’t believe I’ve ever come across an actual virus in the last decade or so, but do deal with exploit and brute force attempts nonstop. Perhaps this is a matter of semantics. I don’t consider the tools and methods used to exploit systems as a virus.