![](/static/253f0d9/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/q98XK4sKtw.png)
Or a tui file manager like ncdu
Or a tui file manager like ncdu
If you’re scared to do rm -rf
, do something else that lets you inspect the entire batch of deletions first. Such as:
find .git ! -type d -print0 | xargs -0 -n1 echo rm -fv
This will print out all the rm -fv
commands that would be run. It’s basically rm -rf --dry-run
, but rm
doesn’t have that common option. Once you’ve verified that that’s what you want to do, run it again without echo
to do the actual deletion. If you’re scared of having that in your history, either use a full path for .git, or prepend a space to the non-echo version of the command to make it avoid showing up in your shell history (assuming you have ignorespace in your HISTCONTROL env var)
I use this xargs echo
pattern a lot when I’m crafting commands that are potentially destructive or change lots of things.
Python is not found, so $ARCH gets assigned to ""
, and you didn’t double quote your variables in the comparison, so the code parses as [ == "aarch64"
which is a syntax error.
Also, maybe uname -m
could work instead of that Python script.
I’m getting some Pixar Lifted vibes from this!
Oh yeah, exactly. USG and aps and stuff do not. The dream router does, so I would caution against it.
Also, they may force it in the future. Their past behavior does indicate that direction.
Ubiquiti website says that dream router must run unifi.
https://store.ui.com/us/en/collections/unifi-dream-router/products/udr
*Consists of UniFi Network plus two of Protect, Access, Talk, or Connect.
What router do you have? If it’s a dream router, how did you join it to your unifi running in docker on another host?
I have been using ubiquiti for years, and I would strongly caution against using them. They are forcing some devices to sign on to ubiquity cloud and synchronize with their cloud services, and are forcing those sign ins to use MFA. I really miss the ubiquity from 2020, where it was all local. Next time I upgrade my gear, I will probably not buy an ubiquiti router/gateway.
Also the upgrade process from Usg to dream router was awful. Also they don’t let you run unifi in docker with a dream router, you are forced to run it on-device.
Reading this title before looking at the sub was quite a ride.
deleted by creator
My go to for home servers for like 20 years has been used dell optiplexes. They are quite reliable, easy to find, pretty cheap, come in a few different standard physical sizes, and last a long time. The one thing they could do better at is energy efficiency. I spent a total of US $450 on the last two that I bought. I added an LSI HBA to one and it runs 4 HDDs in raidz1.
If there is a redundant block then it will auto recover and just report what happened. Redundancy can be set up with multiple disks or by having a single disk write blocks to multiple places by setting the “copies” property to more than 1.
zfs is made for data integrity. I wouldn’t use anything else for my backups. If a file is corrupted, it will tell you which file when it encounters a checksum error while reading the file.
Have you run lsof
? See also: https://www.brendangregg.com/linuxperf.html
On my phone the map view is just black. Doesn’t matter where I try to view, it’s just black. Screenshots make sure we all see an accurate view regardless of device or whether or not the demo server is up.
has the look and feel of …
Has zero screenshots.
Dude, you’re so not paranoid. This stuff has happened to me. I had a Wordpress blog that was hacked and the exploit was stored in the DB so even after reloading the OS I still was infected because I hadn’t sanitized my database. Luckily it was just Google search viagra spam, and it was a valuable lesson.
As many have pointed out, you don’t know that there is not a back door in your software.
One way to defend against such an unknown is to have a method of quickly reinstalling your system, so if you ever suspect you have been compromised you can reload your OS from scratch and reconfigure it with minimal fuss. This is one reason I recommend folks learn one of the configuration management systems like ansible or puppet, and use those to configure your Linux servers. Having config management also helps you recover anfter unexpected hardware failures.
Defense is done in layers. No one layer will protect you 100%. Build up several layers that you trust and understand.
This makes sense. When you use a copy-on-write block device, it is doing things below the level of the filesystem, so you have to use cow-aware tools to get an accurate view of your used disk space. For example, if you have two files that are 100% deduplicated at the cow-block level, they would show up as different inodes on the filesystem and would appear as using twice the space in the filesystem as they do on the block device. Same would go for snapshots and compressed blocks.
Fuckin seriously! I worked on WiFi back then and when I saw that my jaw hit the floor. Mad hacking skills, as in mad ability to find a solution within a crazy landscape.