Elvith Ma'for

Former Reddfugee, found a new home on feddit.de. Server errors made me switch to discuss.tchncs.de. Now finally @ home on feddit.org.

Likes music, tech, programming, board games and video games. Oh… and coffee, lots of coffee!

I � Unicode!

  • 0 Posts
  • 457 Comments
Joined 2 年前
cake
Cake day: 2024年6月21日

help-circle




  • I’m using Fedora. Works out of the box. You need to add a MOK if you want to use custom kernel modules (or the current Nvidia drivers). But using the nouveau driver or just a standard installation of not using Nvidia hardware works flawlessly without MOK.

    Im using Nvidia. The initial import of the MOK is a bit… strange or scary for non tech people, but afterwards, akmods makes it a breeze. You don’t have to think about it. With Fedora 42, akmods regularly failed to build the driver’s and I had to restart the build manually after a kernel upgrade, but since I upgraded to Fedora 43, it just works.




  • It’s was even easier - KDE showed a notification, I clicked it and got a pop-up telling me about the violation and the commands to fix it of this behavior should be allowed. I could never copy&paste them from there. But yes, checking journalctl every once in a while is a good habit.

    Since it was nothing that really prevented me from using the PC (e.g. virt-manager getting a violation when I shut down a VM), I reported it and waited for a bit if they’d resolve this and then just ran the commands after a two days without fix, because I wanted to get rid of the notifications



  • Same, I had tried Openoffice/LibreOffice in the past and had many problems. Since I got a personal MS Office License very cheap from my employer I used that and didn’t really feel the need that much to look for alternatives.

    Then about a year ago, I reworked some deployments of my self hosted things and added Collabora to my Nextcloud “just for fun”. And I was pleasantly surprised by it. Since that is based on libre office, I had the urge to check that out and realized that it should have everything I usually need. Also I was already dual booting for a while but still hadn’t really switched many “workflows” to Linux, because I was lazy to search for alternatives. This now meant that there was less friction to use Linux as a bonus.






  • From my understanding: Basically the attackers could reply to your version check request (usually done automatically) and tell N++ that there were a new version available. If you then approved the update dialogue, N++ would download and execute the binary from the update link that the server sent you. But this didn’t necessarily need to be a real update, it could have been any binary since neither the answer to the update check nor the download link were verified by N++





  • Wrong, keep reading. You only quoted (6)(a). Now go and read (6)©:

    © security updates or corrective updates mentioned under point (a) need to be available to the user at the latest 4 months after the public release of the source code of an update of the underlying operating system or, if the source code is not publicly released, after an update of the same operating system is released by the operating system provider or on any other product of the same brand;

    As soon as a security patch is published in AOSP they now have 4 months to roll out an update.