
Tech solutions
A post on tiktok where a young lad responded to a commenter “Why do you put your pronouns when you’re cis gender” made way too much sense.
read moreTech solutions
Passwords are weak, we know this and so often methods such as key based authentication is used for connections like SSH.
read moreLinuxTech solutionsUbuntu
After banging my head against this problem from a different server, as WSL is not there yet for running as personal production services, I finally managed to hit the right keywords to google fu the answer.
read moreAbletonMusic
So when using the Frozen Plains Obelisk plugin in Ableton live 10 (I’m running10.
read moreAbletonMusic
It looks like the original website is now unavailable and so I’m posting this here to share as the only other place it’s online it bloody Pinterest
read moreTech solutions
Add the following to your /etc/rkhunter.conf file #Config to add byobu files to your allow list ALLOWHIDDENDIR=/dev/shm/byobu-*-?
read moreTech solutions
You could check for the existence of /var/run/reboot-required just to see if a reboot is needed but it’s more useful to check the existence and contents of /var/run/reboot-required.
read moreTech solutions
I was trying to get this working by configuring the MAIL_CMD like so: echo -e “Subject: [rkhunter] Warnings found for ${HOST_NAME}\n\n” $(egrep -x “^[.
read more