:shocked pikachu:
So people will get something like .25 USD?
Ah. Yeah. I think then you’ll want to look into cloudflare tunnels. I believe that should get you through the cgnt and deal with the dynamic IP ll in one go.
You can deal with the non-static IP by using duckdns.org
Another copy. Would have been crazy if it was the exact copy I had.
I was at a used bookshop the other day and found the same Caldera Open Linux 2.2 book and cd that I used to install my first linux distro on a pc. Man that was exciting!
Super!
I feel this
Fuck Amazon.
youruser:youruser
just means the user’s group. For instance, on my fedora 40 install, my user (bippy, just a silly name), is the username for my user, but also the name of the group that my user belongs to.
So when I do a chown
, I typically do chown -R
bippy:bippy path/to/directory
If you wanted to give permissions to a different group on your system, but also to your main user, you could do a chown -R bippy:wheel /path/to/directory
(wheel
is an example group name, which is similar to sudoers
)
It’s not that Linux can’t do what you specify, but that it may not do it in the way you require, which is based on your windows experience. Lots of what you describe can be done
For example, using command line tools like sed
, rename
, ffmpeg
, find
, etc…, you can do all of the text manipulation you can imagine.
But you also specify that you want gui wrappers, and in all likelihood, there are gui wrappers for what you want to do, but to meet your exact specifications, maybe not.
If you’re willing to do some adapting, which it sounds like you are, the. I think you can pretty easily adapt to Linux, as it’s perfectly capable of handling your high level requirements. It’s in the minutiae of how those requirements are met that is in question.
You could write yourself a bash script to do this.
FTC says water is wet.
Edit: in all seriousness, it’s good that the FTC is talking about this, and it’ll be even better if it does something to combat it.
I so look forward to seeing an ad when I pause a video to inspect whatever is on the screen at that moment.
If it’s a MacBook that no longer gets updates from Apple then it’s probably from around 2014ish, and is definitely an Intel Mac. This is a great candidate for Linux. If you want an environment that is similar to Mac, go with gnome as the desktop environment. Outside of that, any of the major distributions should be fine. I’ve run KDE Neon, Ubuntu, and am currently running fedora on a 2014 iMac and all of them worked without issue.
Color me shocked that a meta product is sacrificing trust so the line continues to go up.
I mean, you could charge like $8 and then give the totally real people that are paying that money a blue checkmark? /s
Seriously though, I like the idea, but the verification has got to be easy to do and consistently successful when you do it.
I run my own matrix server, and the most difficult/annoying part of it is the web of trust and verification of users/sessions/devices. It’s a small private server with just a few people, so I just handle all the verification myself. If my wife had to deal with it it would be a non starter.
Correct me if I’m wrong, but doesn’t there have to be a code layer somewhere in there?
It’s like all those “no code” platforms that just obscure away the actual coding via a gui and blocks/elements/whataver.
MTV!