Sagan did a bit on this.
Sagan did a bit on this.
This might help.
https://www.tecmint.com/clear-ram-memory-cache-buffer-and-swap-space-on-linux/
You could write a simple bash script to get memory and compare it to your desired memory usage then clear memory when desired usage has been exceeded. Then set your script as a cronjob.
Or you can just setup a cronjob to clear memory at a set interval in a cronjob described in the link.
deleted by creator
The key to happiness in life in under a minute.
A gardener’s love is different from that of a square.
A little 90’s comedy bit your comment made me think of.
Skyrim?
You can get POE(power over ethernet) cameras that dont require a separate power source. Closed circuit cameras are the only way to go.
Nationalize his business and sanction all his assets for aiding and abetting the enemy and working as a foreign agent against the US and our allies. Lock him up or deport his ass to Russia.
Everything from the chanel -> History Time. Pete Kelly is an awesome story teller and works really hard on making in depth historical documentaries, some three hours long.
Any closed circuit security systems, ones that aren’t cloud based will come with an NVR (like a DVR) that hosts your recordings locally. Most are wired but some support wireless as well. Generally more expensive but in my opinion worth it.
My mom bought a simple setup for I think 3 or 400 dollars at Costco.
INAL but law enforcement can still request or subpoena your video if they suspect a crime has been witnessed by your cameras AFAIK. But at least you’ll know about it.
I go out of my way to offer to return peoples carts for them, generally anyone but especially women with children and the elderly. To me its no big deal to mash a couple carts together and return theirs with mine.
I’ve always thought that duplicate’s should be somehow grouped together in some way and not outright closed unless it truly is a true duplicate without that nuances. If questions that are similar can generate differing quality answers it would be beneficial. Then linked together as a group.
Cowsay, figlet, telnet towel.blinkenlights.nl, misfortune, cava, xscreensaver are a few that come to mind.
Testdisk, clamxTK, rkhunter or chkrootkit, mobile verification toolkit, lshw, time shift maybe deja-dup.
I think your idea is a good one. Like a linux Swiss Army knife. You can have lots of tools that you don’t need all the time but might be handy in a pinch. Especially if you don’t have internet.
Some people need external validation. Personally I don’t care about votes. However I do give upvotes very often hoping to increase participation. I often upvote comments I disagree with when their in the negative as long as they aren’t being a dick. I think differences of opinion are healthy. It takes no time to read an opinion I don’t agree with and maybe upvote it when they are riding the down vote bandwagon. I like diversity and think our differences could be more valued. I don’t like the whole reddit style popularity contest down vote thing some think social media has to be.
I upvote posts that I have no interest in as well. I want people to feel welcome and create content. I’m far more of a lurker than a creator so it’s in my interest to have others creating content feeling happy about doing so even if I’m not their target audience.
I really don’t hit the down vote button much, if I really don’t like what they have to say I just scroll on. I want Lemmy to be a more welcoming place then reddit. So I try to make it so.
I have no issue blocking obvious troll accounts though.
Wondering how/if this exploit would effect an OS with luks encryption? How could the arbitrary code compromise the encrypted volume? Could it be kept in memory and ran after volume decryption?
I don’t have any real understanding of how code executed before bootloader works or if it’s presistant after boot.
KDE has it built in to default key binding of
Ctrl + Meta + Esc
helpful when in Wayland as xkill only works on X and xwayland apps.