

My understanding is the kernel will remove them if it needs the ram, so there is no need unless it’s for security reasons.


My understanding is the kernel will remove them if it needs the ram, so there is no need unless it’s for security reasons.
Usually pretty skeptical of titles like this, but everything they mention sounds great.


Urgh this guy’s videos are soo long and overdramatic.
This is the Wikipedia article he read: https://en.wikipedia.org/wiki/XZ_Utils_backdoor?wprov=sfla1


This is what good distros do, well some of them, I don’t think low touch repos like AUR/Homebrew/PPA’s would catch this, but I doubt huntarr will ever make it to Debian.
Ofc the trend of running upstream unverted containers undermines this.


Yeah this is why I use Debian instead of containers, you can read the release notes on a stable release.


What is securing those private channels?
Whatever vulnerability there is in that will basically give them root on your home sever right?


Start on any standard distro do a net install or equivalent and pick a different DE, I’d recommend Ubuntu/Fedora/Debian/Suse, but YMMV
Krita is what I use but I also find text handling difficult so I always do text last.


None, if it’s not in a Debian repo I don’t deploy it on my stable server.
It’s not really about docker itself, I just don’t think software has married enough if it’s not packaged properly


I use Debian


Can you label rules, that would be a better approach IMO.
Not familiar enough with UFW but could you parse the output and store the rules number as a variable if this is all one long running script?


Outbound firewall and SMAC protections.
If you compromise my server you’ll struggle to phone home without manual intervention, which is good enough to stop botnets.


Why the move from SDDM to PLM?
Cached files are freeable so the kernel will drop them instead of sending them to swap.
And I’m pretty sure zram is just a swap device in RAM so should follow the same rules.