• 0 Posts
  • 9 Comments
Joined 6 months ago
cake
Cake day: May 20th, 2024

help-circle
  • Flatpak doesn’t come with more libraries to interact with other flatpaks. It comes with libraries that the application’s flatpak you’re downloading requires. However, when installing the flatpak those libraries do not get installed if they are already on the system.

    So widget-flatpak needs lib-a and lib-b. You’re system already has lib-b that flatpak is using for as another flatpak.

    You install widget-flatpak. lib-a gets installed but lib-b does not because you already have it.




  • This is true. If you have DMARC and your RUA set up (with a working email (or one that doesn’t bounce at least)) along with SPF and DKIM, Google and MS will accept your mail. The only time it won’t at that point is if your IP is in the same /24 as a known spammer but so long as the spam stops, you’ll fall off the list. Some of the common spamlists allow you to request your IP be removed by request and I can only recall one list that almost nobody uses that makes you pay for the removal though there may be more I don’t recall.




  • There are a couple of OEMs like System76 and Starlabs that sell laptops with Linux on them, provide tech support for customers and so on.

    And no, installing most distros aren’t hard. You just click the buttons to proceed and fill out the username and password box, select your time zone and select your wi-fi network if you’re using wifi.

    You can do manual partitioning but why would you if you don’t know what you’re doing?

    Installing software in the GUI is as easy as installing software from the Microsoft Store. Just search or look around and when you see something you want, just click the Install button.


  • I get the sentiment but defense in depth is a methodology to live by in IT and auto updating via the Internet is not a good risk to take in general. For example, should Crowdstrike just disappear one day, your entire infrastructure shouldn’t be at enormous risk nor should critical services. Even if it’s your anti-virus, a virus or ransomware shouldn’t be able to easily propagate through the enterprise. If it did, then it is doubtful something like Crowdstrike is going to be able to update and suddenly reverse course. If it can then you’re just lucky that the ransomware that made it through didn’t do anything in defense of itself (disconnecting from the network, blocking CIDRs like Crowdsource’s update servers, blocking processes, whatever) and frankly you can still update those clients anyway from your own AV update server which is a product you’d be using if you aren’t allowing updates from the Internet in order to roll them out in dev first, phasing and/or schedules from your own infrastructure.

    Crowdstrike is just another lesson in that.