

Relax, it’s just turd.
Relax, it’s just turd.
Of course they are!
501 - Headrush
Purity Ring - Stardew
That narrows it down a lot. To be honest, I’m not familiar with that. However, with that specific of a topic, it shouldn’t be that hard to look up for articles to follow and come up with a course of action.
The reason why OSes aren’t ‘hardened’ by default is because it would be a real pain for users trying to set things up or use it for daily operation. If you take it to an extreme, they wouldn’t be able to access anything they want. If you’re a sysadmin, you’d be faced with your whole office pissed off because they wouldn’t be able to do their work.
Last but not least, what does ‘hardened’ mean anyway? You can have something as ‘hardened’ as an airgapped workstation in a faraday cage with an off-grid power supply. Are you running away from a government agency? I wouldn’t think so. So a firewall blocking unused ports and mindful practice should suffice.
Oh hell no!
What does that even mean? What kind of exploitation are you talking about?
Every use case comes with its own risk, and every risk needs to be handled differently. People jokingly said that if you wanna be sure, don’t connect your computer to the network at all; and if you wanna be surer, don’t use a computer. While that was a joke, there’s truth in that.
If you’re just going to use it as a workstation, then firewall to make sure some randos don’t ping you should suffice. If you’re sharing this workstation with your tech illiterate mates, then perhaps something to prevent executing random stuff like SELinux or AppArmor would do. If executing random stuff is just what you do, then set up VMs or some other ways to isolate that execution environment.
If you’re sharing files directly from your computer to the internet (e.g. with SMB or NFS), then you’d need to make sure only the right people have the access, and the auth can’t be brute-forced (i.e. with rate-limiting and lock-out policy). Same goes if you allow remote login (i.e. thru SSH). Some people use custom port number to obscure their stuff, and you can do it too, but do keep in mind it could make your life (or your mates’ lives) harder.
If you’re running other outward facing services like SQL database or HTTP, that would require different ways to address. If you’re on such level, you’d want do some serious readings.
What do you want to achieve exactly?
Different requirement can lead to different approach.
Honestly, I picked it because I was lazy. It’s such a low maintainance machine. As for the codec, the flatpak version of VLC does it.
Yes! I second this! Not many mention of this in the wild these days.
I got openSUSE Leap. It’s stable and reliable. My complaint is that I needed to go thru all the hoops to get all the media codecs I need to play what I want.
All guns should be surrendered and destroyed en masse.
Quoting the original comment directly.
This does not say the militaries can have it.
Oh, don’t be coy. We can already smell the soil on you.
And you know who protect such society? That’s right, folks with guns!
People seem to be unaware that python has bindings for lower-level languages like C. In fact, people have been heavily using resource intensive libraries implemented in C (e.g. numpy, scipy, pandas, uwsgi).
Also, Python interpreter performance has come a long way.
Oldboy. no, not because it’s sad
There’s the Islamic calendar, which uses the lunar cycle instead of solar one. The Javanese also uses lunar calendar, but with different formula for dating.
I know there’s the Chinese calendar, which is based on lunarsolar cycle. Are they the same?
Knife does?
Which exactly proved my point. You can make your gun at home.
If you see one getting caught, imagine how many at large.
Wow, you really hit the spot right here!
Some even had replaceable CPU & GPU!
Not exactly beginner friendly, but you needn’t solder all those fragile components.