• 0 Posts
  • 35 Comments
Joined 7 months ago
cake
Cake day: December 26th, 2023

help-circle
  • I think what happened here is that something went wrong and messed up the permissions of some of the users files. MS help suggested that he login as an administrator and reatore the intended permissions.

    I don’t work with Windows boxes, but see a similar situation come up often enough on Linux boxes. Typically, the cause is that the user elevated to root (e.g. the administrator account) and did something that probably should have been done from their normal account. Now, root owns some user files and things are a big mess until you go back to root and restore the permissions.

    It use to be that this type of thing was not an issue on single user machines, because the one user had full privileges. The industry has since settled on a model of a single user nachine where the user typically has limited privileges, but can elevate when needed. This protects against a lot of ways a user can accidentally destroy their system.

    Having said that, my understanding of Windows is that in a typical single user setup, you can elevate a single program to admin privileges by right clicking and selecting “run as administrator”, so the advice to login as an administrator may not have been nessasary.



  • In addition to the raw compute power, the HP laptop comes with a:

    • monitor
    • keyboard/trackpad
    • charger
    • windows 11
    • active cooling system
    • enclosure

    I’ve been looking for a lapdock [0], and the absolute low-end of the market goes for over $200, which is already more expensive than the hp laptop despite spending no money on any actual compute components.

    Granted, this is because lapdocks are a fairly niche product that are almost always either a luxury purchase (individual users) or a rounding error (datacenter users)

    [0] Keyboard/monitor combo in a laptop form factor, but without a built in computer. It is intended to be used as an interface to an external computer (typically a smartphone or rackmounted server).




  • At a $188 price point. An additional 4GB of memory would probably add ~$10 to the cost, which is over a 5% increase. However, that is not the only component they cheaped out on. The linked unit also only has 64GB of storage, which they should probably increase to have a usable system …

    And soon you find that you just reinvented a mid-market device instead of the low-market device you were trying to sell.

    4GB of ram is still plenty to have a functioning computer. It will not be as capable of a more powerful computer, but that comes with the territory of buying the low cost version of a product.


  • Because the thing people refer to when they say “linux” is not actually an operating system. It is a family of operating systems built by different groups that are built mostly the same way from mostly the same components (which, themselves are built by separate groups).




  • Sudo is a setuid binary, which means it executes with root permissions as a child of of the calling process. This technically works, but gives the untrusted process a lot of ways to mess with sudo and potentially exploit it for unauthorized access.

    Run0 works by having a system service always running in the background as root. Running a command just sends a message to the already running seevice. This leaves a lot less room for exploits.




  • That’s illegally discriminatory.

    Under what law? I’m not familiar with Australia, but here the the US, transfolk are just piggybacking off of legal protections against gender discrimination; which were never actually intended to protect trans people.

    In most cases, that actually works out fine. If you discriminate against a transwomen, it’s because you think they are a man presenting as a women. However, you have no problem with a women presenting as a women, so you are running afoul of gender discrimination laws. Legally speaking, your problem was discriminating against her for being a man.

    In instances like this though, that argument doesn’t apply. Once you get to the “you are discriminating against her for being a man” stage of the analysis, the response is simply “yes, and I’m allowed to discriminate against men”.

    It seems like Australia would need to have a law that specifically protects trans people for her to prevail here.






  • Java did have a Security Manager that can be used to prevent this sort of thing. The original thinking was that the Java runtime would essentially be an OS, and you could have different applets running within the runtime. This required a permission system where you could confine the permissions of parts of a Java program without confining the entire thing; which led to the Java security manager.

    Having said that, the Java Security Manager, while an interesting idea, has never been good. The only place it has ever seen significant use was in webapps, where it earned Java the reputation for being insecure. Nowadays, Java webapps are ancient history due to the success of Javascript.

    The security manager was depreciated in Java 17, and I believe removed entirely in Java 21.


  • I’d just like to interject for a moment. What you’re referring to as Linux, is in fact, GNU/Linux, or as I’ve recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX.

    Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called “Linux”, and many of its users are not aware that it is basically the GNU system, developed by the GNU Project.

    There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine’s resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called “Linux” distributions are really distributions of GNU/Linux.


  • More aid is irrelevant once you have enough aid. And you can get enough aid in through land. More importantly, we have the roads and trucks to get food in today. We have been using the land route to get food into Gaza for years. The problem is that the most powerful military in the region is blocking the land route.

    Now, instead of applying pressure on that military, we are going to spend months building a port to go around them.

    By itself that makes sense; except that military is our close ally. We are their biggest shield on the international stage, and biggest supplier of weapons and defensive systems. However, instead of trying to leverage any of that to try and solve the actual barriers to aid delivery, we are going to spend months building a water route.

    If this approach ends up working, it would not be because water routes are more efficient. It would ve because the US war ships operating the dock exert enough pressure that Isreal would not dare oppose them.

    Of course, even success here only gets food into Gaza. It does not address internal distribution. Ideally, we would use established networks for that. However Israel has running a largly successful campaign to dismantle the only aid network that has been operating at scale within Gaza (unrwa)