[-] myersguy@lemmy.simpl.website 5 points 8 months ago

Hi. I just enjoy watching fights.

[-] myersguy@lemmy.simpl.website 5 points 9 months ago

The aggregate info is public, but valve can tie it to individual users.

[-] myersguy@lemmy.simpl.website 5 points 9 months ago

You might want to look at just how fast RAM is

[-] myersguy@lemmy.simpl.website 5 points 10 months ago

I'm a much bigger fan of the deluge thin client, personally.

[-] myersguy@lemmy.simpl.website 5 points 1 year ago

I used the Lemmy Ansible method to deploy. At the time that I first installed it, it was the recommended method vs a docker compose. It is a little bit of setup, but is pretty simple to get going. Just follow the instructions and it should just work.

[-] myersguy@lemmy.simpl.website 5 points 1 year ago

We are all tired on this day.

[-] myersguy@lemmy.simpl.website 5 points 1 year ago* (last edited 1 year ago)

An attacker escaping from a container can’t be system root as Podman runs rootless (without some other exploit or weak password).

That would be true of podman running anywhere, and is not unique to an immutable distribution.

The filesystem itself is also read-only.

You can change that real quick if you have root access.

[-] myersguy@lemmy.simpl.website 5 points 2 years ago* (last edited 2 years ago)

Not sure how this thing will compete when there are mini PC's like the Beelink SER7 out there.

[-] myersguy@lemmy.simpl.website 5 points 2 years ago

What an attitude you have. He made a suggestion, and wasn't gatekeeping anything.

There exists VanillaOS btw.

[-] myersguy@lemmy.simpl.website 5 points 2 years ago

If I just had one more synthesizer...

view more: ‹ prev next ›

myersguy

joined 2 years ago