This misses the “What dobyou want for your home folder?” -Part of main root structure / Partiton? -Separate Partition mounted at /home?
- do you want xfs, ext2, ext3, ext4, btrfs, zfs?
- do you want snapshotting of home?
This misses the “What dobyou want for your home folder?” -Part of main root structure / Partiton? -Separate Partition mounted at /home?
That’s interesting, is it because Fedora has more recent packages
Yeah, I’m sure there are segments that only use server stuff instead of workstations. I’m on the other end I only deal with desktop, as we have IT for server Stuff
It may not be home user choice, but in enterprise CAD PLM it is. Out of all the Desktop Distros, only SUSE and RHEL were supported so you had to pick one.
There’s desktop RHEL, we used to run a CAD software on RHEL or SUSE
This is a feature in Windows
I actually forget what it worked like. I installed it when I had my Essentials PH1 phone, with the 360 camera add on module. But the battery died on that too many years ago now
There is also this plugin for Eye of GNOME image viewer https://github.com/Aerilius/eog_panorama


Since ZFS isn’t listed here, use BTRFS with snapshotting. Wrecking your install is a thing of the past. And if you go with something like Tumbleweed it auto snapshots every time you enter into an admin task.


Well if Zorin gets their product out ever, it is Zorin Grid. Until then I see opensuse has AD support https://doc.opensuse.org/documentation/leap/security/html/book-security/cha-security-ad.html
As for clients their is Leap/tunbleweed autoyast to capture an install setup and replicate to new installs. Or if you choose MicroOS it’s a config file you use at first boot to set user, apps, settings etc
But I’m hoping Grid will become an all in one management system Zorin promises


More and Faster, here we come
Steals it from your system I meant. Which has even happened to security pros.
True dat. But if they compromise your computer the first thing the look for is key files.
Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys.
At least with hardware key it is removable and requires a button press.
So accessing becomes physical access or quantum computer cracking
I mean yes everything is hackable. Thankfully the hardware key supports FIDO where there is a public / private pair with private locked on the hardware. Not enough services support this though.
So threat is being targeted and having somebody steal the hardware key.
Not if your TOTP codes are generated by another device, then the attacker needs your password, plus the device holding the key for TOTP. If you use it on your phone and authenticator is your phone then a theif has everything when they steal your phone.
Hardware key for TOTP is a better 2FA method as its totally separate from your PC or phone
Its still just a single factor if some body steals your private key.
Is that a mouse in the small of my back?


I’m running an early version of that on a 16 year old ARM board NAS, the NAS has 256MB of RAM and OpenMediaVault runs great on it.


Bloat is relative, I guess.
Yes. Snapshot…make your changes… Try the system…and if it is messed use the old snapshot.
If you try tumbleweed the snapshots are also integrated to the grub menu so you can boot to any snapshot, and if you like the one you booted to you issue sudo snapper rollback and that makes your current snapshot the default.
It also has auto snapshots anytime you use the GUI yast tools, or other CLI tools like zypper, so you don’t have to manually created snapshots. Also has cleanup schedule to remove old snaphots either by date or number of snapshots