This looks dope as fuck, imagine emulating Ōkami on this
This looks dope as fuck, imagine emulating Ōkami on this
My recommendation is Wintermoor Tactics Club https://store.steampowered.com/app/917840/Wintermoor_Tactics_Club/
Its a really cute and funny tactics game where you control the Tactics Club in a series of snowball fights to determine the future of the school. Each club is full of silly little jokes and the tactics got me well enough for me to replay multiple stages for a better score.
From the article, it sounds as though this isn’t something a normal user should be worried about. They said the security researched believe it targets a Linux distribution used by the Indian government, and the phishing/malicious links seem intended to target Indian officials.
After reading the article it seems likely this is still the case. They said operating system links still open in edge even when you have another browser configured, so Microsoft is still putting Edge in a privileged position. I guess we just have to wait and see how privileged it ends up being.
Having been a linux user around the time of both rollouts I’ve had a way better time with pipewire. We’ve come a long way since OG pulseaudio
I went Ubuntu -> Xubuntu -> Debian -> Manjaro -> Arch -> Nix
Arch is still the longest lasting and I’m dual booting with Nix right now, but Nix has been a dream when it comes to gaming stability and I think if it continues I’ll stay.
So I am sort of an embedded developer, and I like to mess around with weird configurations. So the craziest experiment I did was trying to reflash a rasberry pi from a system running in the pi’s RAM. It honestly might have worked, but during the prep work I forgot to resize the filesystem before mucking with the paritions and had to reflash the normal way before I could try again. Ended up just turning it into a pihole instead, but I still learned a lot about pivot_root
Malware sadly is a problem everywhere, but it is arguably less so on Linux. First, Linux is less popular so less malware is written for it to some degree. That doesn’t mean no malware, but if you’re trying to pwn people hitting a website you’ll get more targetting windows, android, or iOS than Linux so it’s a little less prevalent.
Second, it could be argued the security model of Linux is more secure than windows. This is a far more contentious point, but I think that simply from having more eyes on the code Linux has a more secure model. Windows relies on security through obscurity a great deal, and if you talk to cybersecurity experts they will often tell you this is no security at all.
Lastly, because software on Linux is typically installed through centralized repositories of binaries or sandboxed app images, you have to go more out of your way to get dodgy software on Linux. The tradeoff there is that a lot of proprietary apps and helper programs that come with some tech will never be available in the repos and that can send some new users to try finding them elsewhere with all the risks that entails. Some distros go for a middle ground with access to things like the Arch User Repositories, but Ubuntu’s solution is using things like PPA’s to add extra software repositories.
Because you chose to phrase it as an insult. “To keep people like you from doing X” has a very different connotation than “this is a security feature that helps protect inexperienced users from malware.” One is helpful, one is demeaning.
Just as an addendum to your answer. In the command writing to mullvad.list
the | sudo tee /etc/apt/sources.list.d/mullvad.list
is using two helpful linux utilities to modify the command. The first is the |
which is called a pipe and connects the text output of one program to the text input of another. The pipe is connecting the output of echo which simply prints a string, in this case composed of the outputs of several other commands to the program tee
. Tee which is given admin privileges by the sudo
takes an input stream and splits it between two files. In this case those are mullvad.list
and since no other was provided stdout
the output pipeline of the terminal running the command.
EDIT:
In the interest of further completeness. Another utility used in those commands is the command substitution operator of sh
. So when the terminal is interpretting text (some command)
gets substituted out for the text output by the command in the parentheses. It is another common way of connecting commands on the shell to allow for more flexible and powerful commands.
Personally I found the time I saved from not having any control over my system has more than made up for tinkering that I have to do to get things running. My laptop would regularly become unusable for 20+ minutes on windows because of disk performance issues, and I as the user had no means to prevent windows from running the service that locked everything up. That along with other times windows just decides your use case is less important have added up to far more time then having to debug a game here and there
And nothing else? You sure about that? No statements on how chaining prisoners to the floor is totally fine and normal?
Luckily someone already got your number in the other thread you made:
https://sopuli.xyz/comment/12666383