linux

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

0x4E4F, in why does the poster image of c/linux have 3.8mb?

It’s grainy. Grain always takes a lot in size.

stoy, in why does the poster image of c/linux have 3.8mb?

Sorry for being a bit of a dick, I think you mean that the file “is 3.8MB”.

“mb” would mean millibit, 3.8millibit is an impossibly small file size, and would never exist practically (though I an sure that with some clever maths a zip bomb could be designed so that one bit of data could be compressed into 3.8millibits)

MB is the proper shorthand for MegaByte, a decent file size for a high quallity pucture, depending on the format and compression.

Unless we analyze the image, and determine the image format and compression settings we have no idea of if 3.8MB is a resonable size of the file or not, and the mods have hidden a rar file in the picture file, it is highly improbable that would be the case however.

Sorry for being a dick.

kpw,

Please stop purposefully misunderstanding people when the thing their trying to say is clear. Most annoying character trait one could have.

explore_broaden,

It leads to genuine confusion because of the difference between Mb and MB (and further MiB), so this is a good point to make in this case.

stoy,

This is all fair, I can’t say it wont happen again ever, but I usually am not this kind of a dick.

juli,

I was just lazy, but thx for the explanation and the importance of correct spelling

stoy,

Eh, you should not have had to deal with that, I was just annoyed about other stuff and should have ignored the post instead of being a dick.

I am sorry for my bad post.

governorkeagan,

I’ll add some context for anyone who might be interested.

why does the poster image of c/linux have 3.8mb?

When speaking Portuguese (possibly Spanish as well) you would say it like this, a imagem tem….

It is quite common for native speakers of Portuguese (and probably Spanish) mix this up when speaking English.

source: I speak Portuguese

_edge,

OP does not argue about ‘has’ vs ‘is’.

governorkeagan, (edited )

I’m just adding useful extra information to the thread.

Sorry for being a bit of a dick, I think you mean that the file “is 3.8MB”.

The sentence I was referring to in my original comment.

Edit: added context

teawrecks, in why does the poster image of c/linux have 3.8mb?

Which are you suggesting?

  • that the image could be losslessly compressed more efficiently?
  • that lossy compression should be used more aggressively?
  • that there is extra data hidden in the file?
_edge,

It’s 5120 px wide. Is this necessary?

teawrecks,

That’s a question for a web developer, which I am not. I would expect it to be the max common resolution width. A quick Google shows that modern ultrawides are 5120x1440. So that’s probably why.

Deckweiss, (edited )

So if you are not a cook, you can’t answer questions about food taste?

teawrecks,

I mean, I took a guess. I don’t know what you want from me.

Deckweiss,

I want you to laugh at my joke question.

kglitch, (edited )

I'm a web developer.

Lemmy does not use the entire screen width. The way it has been embedded in the page means that image takes up only 850 pixels of horizontal space so it could be 5x smaller and no one would be able to see the difference.

Lemmy really should be automatically resizing the images (on the server) when they are uploaded, not every single time the community is viewed (in the browser).

gregorum, (edited )

it’s not. the lemmy-ui max width for the poster element is far smaller than that (1104x960). in fact, the poster element is set to be a near-square (displays as rectangular in web and mobile web on the page header), as it also displays in the sidebar and in mobile apps as a square if the image is. most mods simply assume it’s a rectangle and upload a rectangular image.

this image is made to be the largest usable resolution lemmy can display as a community poster and optimized to be very small in file size. see on lemm.ee/c/plex

https://lemm.ee/pictrs/image/6df8e5b3-a7fb-441d-a114-94513bcccc56.webp?format=webp

ReCursing, in Manjaro OS
@ReCursing@kbin.social avatar

Running Manjaro here. I'm been using Linux exclusively for years, and while I'm not a power user I like to think I'm conversant with it. I've had the odd problem here or there, but honestly not any more than I would expect with any other distro. I picked it because I wanted a rolling release distro that used KDE, and SuSE Tumbleweed didn't want to install that day!

zingo, in why does the poster image of c/linux have 3.8mb?

Interesting!

juli, in What Tweak, Program, ... changes a Desktop Environment from unusable to great for you?
Illecors, in Sway-Talisman: Sway – Terminal Application Launcher in Scratchpad, Minimalist And Native

I’m not convinced this is better thatn my floating alacritty window piping through fzf, sort and xargs.

Repo needs at least screenshots, ideally a gif or two showing the product in action.

Other than that - great work!

Pantherina, in 7 Ways to Tweak Sudo Command in Linux

I.e. how malware could easily catch your Sudo password without root access.

Peeps, bad news, Linux is damn insecure.

By simply placing an alias in your bashrc they could already grab your sudo password.

Another bad news, this Windows “okay” Button without any password is actually more secure.

digdilem,

Either you’re trolling - in which case, sod off back to Reddit - or you have a woeful misunderstanding of how Linux user permissions work.

Please explain how someone might “simply change” someone else’s .bashrc without either already having access to that user account, or root access on the whole machine?

IAm_A_Complete_Idiot, (edited )

The idea is malware you installed would presumably run under your user account and have access. You could explicitly give it different UIDs or even containerize it to counteract that, but by default a process can access everything it’s UID can, which isn’t great. And even still to this day that’s how users execute a lot of processes.

Windows isn’t much better here, though.

Pantherina,

Regarding Windows all I read is that this “admin permission dialog” is launched in some form of sandbox where no software can access it. Not sure about faking input devices though, and I am also not promoting Windows for Security

IAm_A_Complete_Idiot, (edited )

True, but that doesn’t necessarily matter if I can compromise the privileged app instead. I could replace it, modify it on disk, or really any number of things in order to get myself a hook into a privileged position.

Just injecting code in some function call which launches malware.exe would do the trick. Ofc signature checks and the like can help here - but those aren’t a given. There’s any number of ways you can elevate yourself on a system based off of user security if your threat model is malicious processes. Linux (and windows) will stop users from accessing each other’s crap by default, but not processes.

Or: supply chain attacks. Now your official app without any modifications is malicious.

sudneo,

If you containerize, the application (malware) will run under the user configured in the image, unless you override it, and in a separate mount namespace, unless you change that, which makes the “alias sudo” trick extremely unlikely.

Even running under a separate user anyway prevents almost fully the attack you mention, unless the separate user has root privileges or the DAC_OVERRIDE capability is assigned to the binary (assigning it requires CAP_SYS_ADMIN).

In short, the attack you mention is a common persistence and privilege escalation vector, which is relatively easy to detect (watch for changes to shell profiles), although preventing it requires some care. I just want to point out that in single-user machines (e.g. personal computers) escalating to root is anyway fairly unnecessary, given that all the juicy stuff (ssh keys, data, etc.) is anyway probably running under/owned by that user.

IAm_A_Complete_Idiot,

Yep! You can also get pretty far even without containers. At the end of the day containers are just sandboxing using namespaces, and systemd can expose that pretty trivially for services, and tools like bubble wrap / flatpak let you do it for desktop apps. In an ideal world every package would only use the namespaces it needs, and stuff like this would largely not be a concern.

Pantherina,

Nearly all tools (with flatpak and portals progressing into better directions but probably never finished) have rw permissions everwhere.

The modern OS threat model is not other users, as private users mostly have single user systems. It is malware and software doing nasty things.

On Linux this always worked out somehow, but grabbing your sudo password is not hard, just alias sudo to a script reading your argument, reading your password, and piping the password to the real sudo. You dont even notice it but that script just got your sudo password.

Dont know what Reddit has to do with that

ReversalHatchery,

It’s not about someone, it’s about something. A lot of us aren’t (only) using Linux as a server OS, but for desktop too, and desktop usage involves running much more different kinds of software that you simply just can’t afford to audit, and at times there are programs that you can’t choose to not use, because it’s not on you but on someone on whom you depend.

Then it’s not even only that. It’s not only random shit or a game you got that can edit your bashrc and such, but if let’s say there’s a critical vulnerability in a complex software you use, like a web browser, an attacker could make use of that to take over your account with the use of a bashrc alias.

ShortN0te,

I.e. how malware could easily catch your Sudo password without root access.

Peeps, bad news, Linux is damn insecure.

By simply placing an alias in your bashrc they could already grab your sudo password.

Another bad news, this Windows “okay” Button without any password is actually more secure.

In other words: a compromised system at the User level can easily compromised at the admin level if there are no additional checks/measures in place. Same for Windows. Just change the link to a Programm you commonly need the press OK to to you maleware. Profit.

IAm_A_Complete_Idiot,

The proper way to handle issues like these is process level permissions (i.e. capability systems), instead of user level. Linux CGroups, namespaces, etc. are already moving that way, and in effect that’s the way windows is trying to head too. (Windows has its own form of containerization called AppContainers, which UWP apps use. Windows also has its own capability system).

UnfortunateShort, in Manjaro OS

Besides the points made - using their own repos. It kind of defeats an important point of using Arch, if you don’t use the official repos as your main source of packages imo.

It’s a rolling release. You have to let it roll. Arch already has testing repos, there is zero need to test outside of them.

interceder270,

there is zero need to test outside of them.

Then how do you explain Arch users have to deal with breakages Manjaro users do not because the Manjaro team doesn’t push updates as quickly?

UnfortunateShort,

Because they don’t push updates as quickly, which reduces the chances of something slipping through, be it their merit or not. This comes at the expense that it sometimes breaks dependencies and still has close to zero real benefits:

  1. You are better off simply using snapshots. Then you don’t depend on the testing of either party.
  2. Even if the Manjaro devs do to find bugs, they could have found them in Arch Testing as well, which benefits everyone.

I stand by my point that the update strategy is not a feature.

interceder270, (edited )
  1. I have snapshots included as well.
  2. Bugs found even in Testing and Stable can be prevented from entering Manjaro repos!

I stand by my point that the update strategy is a feature. You might not understand this, but my experience speaks for itself!

Atemu, in What distro would you recommend for a 32-bit old Acer One laptop?
@Atemu@lemmy.ml avatar

See if you can get the memory upgraded. DDR3 SO-DIMMs should be dirt cheap.

I’d also get a cheap SSD aswell, especially if this is for a child who might not be very careful with the machine.

Doll_Tow_Jet-ski,

Hmmm yeah I hadn't thought about upgrading the laptop, that's a big idea, and indeed it should be super cheap

LeFantome,

I use super old hardware as well. An SSD will blow your mind.

Krtek, in What distro would you recommend for a 32-bit old Acer One laptop?

If you don’t have to use it but want to keep it functional, why just not reinstall MX again? You know that and how it works

Doll_Tow_Jet-ski,

Because it does give me a functional piece of software to grab YouTube videos without actually opening YouTube, but it cannot really run Firefox with uBlock, which basically means web browsing is impossible

Herbstzeitlose, in 7 Ways to Tweak Sudo Command in Linux

Please stop the blogspam. Nobody wants to see yet another shitty list.

noodlejetski,

bu-bu-but number 4 will shock you!

bizdelnick,

You are right. I expected to see a boring list of most frequently used options from /etc/sudoers, but WOW! The author is very brave guy!

somenonewho, in 7 Ways to Tweak Sudo Command in Linux

An article about tweaking sudo without insults?

shotgun_crab,

This incident will be reported

Valmond,

Guru meditation number: 73564804

mustbe3to20signs,

Insults is a bonus after tip 7

somenonewho,

Oops guess I didn’t read far enough ;)

Unyieldingly, in Winewayland.drv: part 11: Mouselook support · Merge requests

This was a issue XWayland had for years, good to see they fixed it so fast.

neige,

The whole project is finished. He’s slowly merging so the Wine main devs are not forced to review the whole project all at once and miss details in their review

theshatterstone54,

How many more PRs/MRs left? And when will it be available via wine staging? I can’t wait to try Wayland gaming on Hyprland! I’ve moved everything else over to it already

neige,

around 4-5 MR left. Yes it will.

mactan,

you can try… to very mixed results www.youtube.com/watch?v=bg-xugXfSGM

zolax, in Requesting advice on converting a Laptop Keyboard from QWERTY to Colemak-dh

oh wow another colemak-dh user

but I’d avoid converting until you’re able to touch-type. then you can show off to everyone w/ your weird-looking keyboard layout lol

  • All
  • Subscribed
  • Moderated
  • Favorites
  • linux@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #