The command was rm -rf $pathvariable
Bug in the code caused the path to be root. Wasn't explicitly malicious
The command was rm -rf $pathvariable
Bug in the code caused the path to be root. Wasn't explicitly malicious
Did you expose your router login page to the open internet? How'd they get access? Why are you chmoding anything to be 777?
Yeah that's the one I meant. Damn, that's too bad
Does the "prevent sleeping" toggle in the power icon on the task bar work in this case?
Gotta throw my vote in for tumbleweed. Its IMO the best distro to get the latest packages while still maintaining stability. Their built in roll back feature is great.
Software not being well supported is kinda a sticking point. Though honestly its becoming less and less of an issue each day. Flatpaks are available for almost everything, distrobox covers the rest. I really haven't run into any situation that prevented me from doing what I wanted. I've been using it for a few years now across my desktop, laptop, and my computer at work. Suse is enterprise Linux after all, its still got great support
KDE Neon is going to be better supported than installing plasma on Ubuntu. Option 2 will be less of a headache long term I think.
It's complicated. I'm no lawyer so take this with a grain of salt, but LLCs don't offer blanket protection. https://en.m.wikipedia.org/wiki/Piercing_the_corporate_veil
It is possible to go after people directly, and side step the LLC protection in certain cases. Depends how much Nintendo wants to screw these guys.
Don't underestimate the relief of a clean ending. The author isn't in a good place, it won't do him any favors to leave it up. He clearly wants to put this chapter of his life behind him.
Ubuntu isn't really on the cutting edge, so I'm not sure how well its going to work. Opensuse tumbleweed is running pretty much the latest everything, so its possible youll need to wait until the next Ubuntu lts
It's disappointing to see so many commentors arguing against you wanting to do this. Windows has it through bitlocker which is secured via the TPM as you know. Yes it can be bypassed, but it's all about your threat level and effort into mitigating it.
I am currently using a TPM on my opensuse tumbleweed machine to auto unencrypt my drive during boot. What you want to do is possible, but not widely supported (yet). Unfortunately, the best I can do is point you to the section in the opensuse wiki that worked for me.
https://en.opensuse.org/SDB:Encrypted_root_file_system
If you scroll down on that page you'll see the section about TPM support. I don't know how well it will play with your OS. As always, back up all your files before messing with hard drive encryption. Best of luck!
The "real" way needs the corresponding Wayland protocol in order to work. The protocol is under development/review, but involves a lot more moving parts that requires coordination and approval from multiple people. This "fake" way was able to be implemented faster and by fewer people as a stop-gap measure
Downloaded from the KDE store