Is it possible that you’re on a different TTY? The login screen used in Fedora has some problems with using the correct TTY if you don’t use auto-login. If this happens again, try cycling through them, maybe your old session is still there.
I believe some BSDs use it too, and WSL2 will make Linux applications automatically appear on Windows, so editing desktop files may be useful there too. Plus, you don’t need to deal with different architectures (aarch vs amd64).
Alright, but maybe take a look into something like Zenity. The task done by your tool doesn’t really justify installing a huge JRE, when a simple bash script would suffice.
I didn’t make the tool, I merely answered a question.
Had I wanted to develop such a tool myself I probably would’ve gone Python + Qt6 or used some Rust GTK wrapper, or maybe dust off Gambas if all I want it a a few buttons and text fields.
Because that’s what I learned from Uni, didn’t want that skill to go to waste. I was thinking about how it would be easier to make the apps (plain applications that use executables and shell to run) .desktop file without any hassle (for new Linux users).
Also, Python was two semesters ago, so I forgot all about it.
An application and programs that use shell as their application, for example, IntelliJ IDEA use ‘idea.sh’ to run the IDE, so it would be useful for people to right-click and just create the ‘.desktop’ file right away.
When you expose ports to the Internet. It’s honestly interesting to setup a Web server with the default page on it and see how quickly you get hits on it. You don’t need to register a DNS or be part of an index anywhere. If you open a port (and your router does forward it) then you WILL get scanned for vulnerabilities. It’s like going naked in the forest, you sure can do that but clothes help, even if it’s “just” again ivy or random critters. Now obviously the LONGER you run naked or leave a computer exposed, the most likely you are to get a bad bug.
Can confirm. As an example, I’m developing a game server that runs a raw socket connection over the Telnet port. Within 10 minutes of opening the port, I reliably get requests trying to use Telnet to enable command mode or login as admin. People are constantly scanning.
Don’t most desktop environments already have this?
If you want to include this as an option when right clicking the desktop, you will probably need to patch this into the DE of your choice, however I think at least KDE has an option for custom right click actions.
I see, I didn’t know KDE had that, does KDE allow java apps to be used as the right click action? As for GNOME, I’m still trying to figure it out.
Until then, I will post the link to the app in the future. It needs some beautification, and quality of life changes so you and the others can use it as you use sudo apt update and upgrade to update your PCs.
These are used by Plasma and most KDE apps that deal with files.
Krusader has a more powerful system for this called UserActions, but they’re exclusive to Krusader and afaik Krusader is also compatible with service menus, so these are much less portable: docs.kde.org/trunk5/en/…/useractions.html
Don’t be discouraged, doing something from scratch is always a great learning opportunity and even if this isn’t the first iteration of such a tool there is room improvement, for instance, I don’t think any of the tools that allow creation .desktop shortcuts interface with any context menu as yours would do in the future, so that could be a cool feature to show off!
I don’t see why not. The example config file has a whole bunch of complex commands, far more than just the java --jar you need to run a Java application.
When these launched they seemed interesting. I liked the concept, and they still do, but the biggest flaw was basing them on windows. I’ve seen windows on low-power devices before, and I’m not going through that again.
If anything, a firewall only seems to provide extra precautions against mistakes made by the user, rather than actively preventing bad actors from getting in.
You say that like that isn’t providing value. How many services are listening on a port on your system right now? Run ‘ss -ltpu’ and prepare to be surprised.
Security isn’t about “this will make you secure” it’s about layers of protection and probability. It’s a “good practice” because people make mistakes and having a second line of defense helps reduce the odds of a hack.
Security isn’t about “this will make you secure” it’s about layers of protection and probability. It’s a “good practice” because people make mistakes and having a second line of defense helps reduce the odds of a hack.
AKA Defense In Depth and should be considered for any type of security.
linux
Oldest
This magazine is from a federated server and may be incomplete. Browse more on the original instance.