come develop Golang , its good here.
… and other ridiculous cope statements to laugh about
I am in this post and I don’t like it.
come develop Golang , its good here.
… and other ridiculous cope statements to laugh about
I am in this post and I don’t like it.
But you went the extra mile and set up your own instance to do this, right?
Nice bio btw.
Lemmy does not support karma, but account age if I’m not mistaken. Maybe add a rule to require a certain account age before accepting a post. The main idea is to prevent astroturfing, spam accounts and socket puppets for ban evasion.
Not sure how effective this is since violators could setup an own instance which lies about the account age. Still quite the investment for ban evasion IMHO.
I would go nowhere near a drenched feline since the most common version of them is likely in a very bad mood due to being drenched.
PlantUML supports Gantt charts if I remember correctly. Can run locally (java if I’m not mistaken) or via web.
clickops
I think I will steal this.
Ah, the horcrux technique.
The XDG default location would be ~/.config/autostart/
. It contains .desktop
files for programs to start automatically.
What if I know it will compile for several minutes so I leave it alone to go office chair jousting? It would be fair to lock up the UI in this case.
Hmm, I see. The perfectionist in me would want to shed that processor load though ^^
Without any judgement: why are your servers running X11? Just because you dislike SSH’ing to them?
If all of those servers are yours (which they likely are, since you get ssh access), you can use one key for all. Using different keys would make one compromised key less problematic. But if someone was able to copy one file of your system, they can copy multiple files.
That resolves keeping track of things as well 😄
You forgot the package hollywood.
I think they come with ublock itself and are called “annoyance filters” or something like that.
I would recommend key based authentication for SSH connections. For the normal connection, the key pair is enough, if you want admin (root) access, you would use the command sudo which in turn requires a password. For creating a default admin account: Linux does this for you, it’s called root. You should create a personal user to work with in daily business and add it to the sudoers group (permits using the sudo command)
I’m a sucker for jetbrains Mono when I need a monospaced font. It just looks nice to me.
If the package comes from the repo, you can uninstall it by the same name you used to install it. If it came from a .deb file (in case of debian), you can find out how the package calls itself and use that name to uninstall. Usually the package name is quite identical to the file name. And dpkg -L
shows you which files came from the package and where they were installed.
I’m fine with config files, as long as they are where you expect them (~/.config/tool or ~/.tool). What I dislike is yet another funny config syntax because the dev couldn’t settle on an established standard. Command line syntax is ok, if you give me sensible completions.
Not a recommendation per se, but you can use any backup software as long as you can edit your live iso. For example puting the restic binary into /opt
Could be stupid input validation which requires
^ssh-rsa