• 1 Post
  • 208 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle











  • cybersandwich@lemmy.worldtoLinux@lemmy.mlNixOS forked
    link
    fedilink
    arrow-up
    9
    arrow-down
    14
    ·
    2 months ago

    Wait so people got butthurt that a company made a deal with nix. That company also does business with ICE. And people are mad at Nix?

    What am I missing?

    Also companies and open source entities do business with all manner of government(s) all the time.


  • cybersandwich@lemmy.worldtoSelfhosted@lemmy.worldPost your Servernames!
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    2 months ago

    “rocinante” for my proxmox host.

    “awkward, past his prime, and engaged in a task beyond his capacities.” From don Quixote’s wiki page.

    It seemed fitting considering it is a server built from old PC parts…engaged in tasks beyond its abilities.

    The rest of my servers (VMs moslty) are named for what they actually do/which vlan they are on (eg vm15) and aren’t fun or excitin names. But at least I know if I am on that VM it has access to that vlan(or that it’s segregated from my other networks).





  • Having wifi and Bluetooth issues sucks!

    I don’t know why it’s not loading automatically. Maybe something is blacklisting that driver? You could dmesg | grep Bluetooth and see what it might show.

    Starting it at boot should be easy though.

    create a new configuration file in /etc/modules-load.d/. This directory is specifically for loading kernel modules during the boot process. You can name the file something descriptive, like btusb.conf or whyisfuckingbluetoothstillaproblemin2024.conf

    Inside the file, add the name of the module you wish to load automatically. In your case, you only need to write btusb on a new line. Save and reboot and it should be loaded.

    You can check with: lsmod | grep btusb



  • I think he was trying to say apps get access to “root features” through an abstraction layer/API calls that is controlled.

    They don’t/wouldn’t have carte blanche root access to the underlying system. It’s kinda like a docker container or VM or flatpaks/snap packages on Linux. They are sandboxed from everything else and have to be given explicit premission to do certain things(anything that would need root privileges/hardware access).