There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

bizdelnick

@[email protected]

This profile is from a federated server and may be incomplete. Browse more on the original instance.

How are you parsing JSON on the command line?

I want to extract and process the metadata from PNG images and the first line of .safetensors files for LLM’s and LoRA’s. I could spend ages farting around with sed or awk but formats of files are constantly changing. I’d like a faster way to see a summary of training and a few other details when they are available.

bizdelnick ,

It’s just generally faster to use the terminal if you know what you’re doing.

It’s also true for other distros. Not because they have poor GUI tools but because CLI is faster than GUI if you know what you are doing.

bizdelnick ,

Be careful if you buy a Samsung 8x0 SSD. They have long standing bugs that may cause data loss. They are worked around in the kernel, however you have to ensure that the workaround for your particular model exists in the kernel version you use.

bizdelnick , (edited )

Glibc preserves backward compatibility, so if you build against the oldest version you want to support, the resulting binary will work with newer ones.

However that’s definitely not what I recommend to do. Better learn packaging and build native packages for distros you are going to support. OBS can make this a bit easier (if your software is FOSS), but any modern CI will also do the job.

bizdelnick ,

Isn’t that video stream already compressed? Or you want to convert it using another codec/bitrate?

bizdelnick ,

LOL, all Linux vendors = Red Hat.

All generalizations are false.

SSH login without user name? (docs.gitlab.com)

I was reading GitLab’s documentation (see link) on how to write to a repository from within the CI pipeline and noticed something: The described Docker executor is able to authenticate e.g. against the Git repository with only a private SSH key, being told absolutely nothing about the user’s name it is associated with....

bizdelnick ,

Technically, you always use a username, however in case of Gitlab that SSH username is always git. When an SSH client connects to server, it offers an authentication method. Gitlab accepts that method only if it is a publickey and the fingerprint of the offered key maps to the known Gitlab user.

bizdelnick ,

git config core.sshCommand ‘ssh -i <path to desired key>’

bizdelnick ,

And also show ls -l /etc/fonts/conf.d

bizdelnick ,

This is a correct recommendation, however in Debian-based distros you don’t need to edit configuration files manually. Just pick some of preinstalled configs. They are installed in /usr/share/fontconfig/conf.avail and symlinked to /etc/fonts/conf.d.

bizdelnick ,

The biggest problem that I see on this screenshot is that it is a compressed JPEG.

bizdelnick ,

I don’t know, however this is impossible to understand what’s wrong with your fonts.

bizdelnick ,

<span style="color:#323232;">touch a b c 'd e f' 'g h i'
</span><span style="color:#323232;">for f in *; do ls -la "$f"; done
</span>

fxd

bizdelnick ,

It’s the same across all POSIX compliant shells. zsh is not POSIX compliant.

bizdelnick ,

Try to avoid using any file manager (uninstall them all if it is difficult to avoid running them). So you will practice in using file manipulation commands.

How can i do whatever I want to do ?

I wanted to install jackett and sonarr, they are complicated to use as is, moreover I am using Ubuntu. I am following fuidleine for installing jackett with STUPID command line making it EXTRA difficult. But now I have to change directory ownerships and what nots. I am the ONLY user on this machine. I want to own everything by...

bizdelnick ,

Before anyone getting on about Security I don’t give 2centa about it

So Linux is not for you. Take a look at MS DOS 4.0, its sources were published few days ago.

Why is folder sharing between host and guest in KVM so hard?

I’m having the hardest tine setting up a shared folder between a Linux host and Win11guest. I want to get rid of dual boot, but there are a few programs that I use which are Win only. I have set up a VB VM, but I want a fine tuned KVM VM. On VB sharing is trivial, but I can’t get it to work in KVM. I have the host sharing...

bizdelnick ,

The native directory sharing method for kvm is virtiofs. Have you tried it?

How to make it so frequently used sites don't constantly require 2FA? [SOLVED]

EDIT: After reading all the responses, I’ve decided to allow cookies to persist after they close the browser, which I expect will make it so that 2FA doesn’t kick in as often, at least not on their most frequently used web sites. I may also look into privacy oriented browser extensions that might offer some protection, such...

bizdelnick ,

Why not use Privacy Badger to prevent usage of tracking cookies?

Repairing bad sectors in an external drive

So I have this external 2.5" drive salvaged from an old laptop of mine. I was trying to use it to backup/store data but the transfer to the drive fails repeatedly at the ~290GB mark leading me to believe that maybe there is a bad sector on the drive. I tried to inspect the drive using smartmontools and smartctl but since it is...

bizdelnick ,

I recommend to throw away this drive because blocks that are readable and writeable now, may fail soon. But if you want to use it anyway, it is possible to collect a list of unaccessible blocks usong badblocks and pass it to mkfs to create a filesystem that ignores that blocks. IIRC this is described in man badblocks.

Easily find program name from context menu/without terminal?

I occasionally need to know the names of programs. I asked here about “Run as Administrator” being added to the context menu (like in Windows), and the response was basically “can’t be easily done”. an example is if I wish to edit a config file it cannot be done without accessing the terminal. Knowing the name...

bizdelnick ,

Use bash-completion, it is much faster than clicking menus.

every distro I’ve tried has a strong sense that if you’re using the GUI you don’t need or deserve admin controls

GUI tools are not suited to be run as root in general. Few ones that are have special measures taken to prevent gaining privileges by another process, e. g. run a background non-GUI process as root and GUI communicating with it as an ordinary user. Such tools (package managers, system tweakers etc.) are usually configured to get required privileges via polkit (e. g. pkexec synaptic to run GUI package manager in Debian). Don’t use sudo to run GUI programs!

bizdelnick ,

You don’t need to run any GUI programs as root.

bizdelnick ,

I have no idea what you are talking about. The answer to your question is: this is impossible and this is done for purpose. Don’t try to work in linux like in windows.

bizdelnick ,

Don’t do this. I’m unsure if this works in any distro, but if it does, this is unsecure.

bizdelnick ,

Don’t do this. I’m unsure if this works in any distro, but if it does, this is unsecure.

bizdelnick ,

Nope. Running GUI as root in the same X server as unprivileged apps is insecure because each of them can take control over privileged window. IDK if this issue has been addressed in Wayland, but anyway there are no wayland-only distros nowadays.

bizdelnick ,

Sysadmin GUI tools are designed to be secure by isolating GUI from privileged process. That is not true for a random GUI app.

bizdelnick ,

Probably? They won’t run with sudo normally (in xorg at least). And only those explicitly allowed to be run with pkexec by maintainers will do. Of course it is possible to evade this restriction, but you definitely should not.

bizdelnick ,

It’s not when app was written. Wayland apps probably work with sudo, x11 don’t because sudo does not pass the $DISPLAYenvironment variable. It’s a correct behavior of sudo because running x11 apps with root permission you create a security hole.

bizdelnick ,

I know. Don’t do this. Read the manual.

bizdelnick ,

Idk what is bleachbit. But I know that “auth systems” can’t “handle GUIs in a secure fashion”. The app itself can be secure or not. By default they are not secure if they provide a GUI running in privileged process.

bizdelnick ,

gksu and kdesu are unsupported for >10 years iirc, they were not more secure than sudo and that’s one of the reasons they were abandoned. I’ve never heard about sux. Polkit is a bit another thing that indeed replaced them, however it does not and can not separate GUI and non-GUI processes. The process itself has to fork, drop privileges and draw a GUI after that. There’s no difference between running it via sudo or pkexec, however polkit provide additional protections to prevent running unsafe apps with elevated privileges.

PAM and GVFS are not “privilege elevation frameworks” whatever you mean by this.

bizdelnick ,

Don’t search tasks for a tool. Search a tool for your tasks.

Help with HDD

I have a 4TB HDD that I use to store music, films, images, and text files. I have a 250GB SDD that I use to install my OS and video games. So far I didn’t have any problem with this setup, obviously it’s a bit slower when it reads the HDD but nothing too serious, but lately it’s gotten way worse, where it just lags too...

bizdelnick , (edited )

Check its SMART: smartctl -a /dev/sdb.

bizdelnick ,

Everything seems ok. It is unlikely that the disk itself is dying. Maybe the problem is a bad cable or bus controller. Or something is wrong with the filesystem.

bizdelnick ,

Software opens a symlink the same way as a regular file. The kernel reads a path stored in a symlink and then opens a file with that path (or returns a error if unable to do this for some reason). But if a program needs to perform specific actions on symlinks, it is able to check the file type and resolve symlink path.

To determine how some specific software handle symlinks, read its documentation. It may have settigs like “follow symlinks” or “don’t follow symlinks”.

How the xz backdoor highlights a major flaw in Nix (shadeyg56.vercel.app)

The main issue is the handling of security updates within the Nixpkgs ecosystem, which relies on Nix’s CI system, Hydra, to test and build packages. Due to the extensive number of packages in the Nixpkgs repository, the process can be slow, causing delays in the release of updates. As an example, the updated xz 5.4.6 package...

bizdelnick ,

Anyway the xz backdoor was enabled only in rpm and deb packages.

bizdelnick ,

Nope. There were checks of build environment.

bizdelnick ,

Because nobody can be sure there are no other backdoors. And, I guess, they wanted to stop distribution of affected source code.

Is xz 5.6.1-3+ still dangerous?

When the xz backdoor was discovered, I quickly uninstalled my Arch based setup with an infected version of the software and switched to a distro that shipped an older version (5.5 or 5.4 or something). I found an article which said that in 5.6.1-3 the backdoor was “fixed” by just not letting the malware part communicating...

bizdelnick ,

So you need to downgrade to even earlier version. Best of all, use a fork created by Joey Hess.

bizdelnick , (edited )

I don’t know for sure, it depends on changes in the liblzma API. If there were any changes (backward compatible or not, usually nobody cares about forward compatibility), yes, recompiling is required.

Reproducing a Microsoft corporate environment on Linux.

Most companies I’ve worked at where employees had a Microsoft work computers. They were under heavy control, even with admin privileges. I was wondering, for a corporate environment, how employees’Linux desktops could be kept under control in a similar way. What would be an open source or Linux based alternative to the...

bizdelnick ,

If you want to control users, don’t give them admin privileges.

Most of things you enumerated solve windows specific problems and therefore have no analogs in other OSes.

bizdelnick ,

No way. You completely trust them or you do not trust them at all. In any OS. That’s how security works.

bizdelnick ,

This does not mean that you won’t have troubles because of new software bugs or incompatibilities with old configs.

bizdelnick ,

Have you ever upgraded debian? If both local config and default config have changed, it suggests you review the changes and choose which config to use or merge it manually.

Should I use QEMU/virt-manager or Virtualbox for a Windows virtualized instance?

I use Arch Linux, and some apps require me to use Windows. I have tried to get Wine working, but it’s just too much of a hassle. If the only goal of my virtualization setup is to run something like Adobe apps (I’m not doing any gaming on it), will Virtualbox or virt-manager be the quick and easy choice for me? I have tried...

bizdelnick ,

Both work. But for desktop use I recommend VirtualBox.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines