I can’t think of any reason the backend can’t be open-source too.
I can’t think of any reason the backend can’t be open-source too.
I missed the word “server” every time and thought it was a client, and spent far too long trying to figure out how you’d play Minecraft in Bash. Text based? ASCII graphics?
I’ve been using Alma for a while and been happy with it. Like RHEL types, it’s slightly behind on versioning, but that’s by design.
Yes, and that’s a good thing if you don’t want it to start killing processes. You have that extra time/space to deal with the out-of-memory condition yourself.
Or you can ignore that condition and continue using the system in a degraded state, with swap as “disk RAM”.
Nobody. And it’s not like Red Hat runs the X.Org Foundation, either, at most they have one seat on the board. Development will continue.
I’m not sure what that post is meant to show, if swap isn’t “disk RAM”. That post even concludes:
Swap […] provides another, slower source of memory […]
PSoD is already used by VMware ESXi. And Windows Insider builds, I think.
Maybe green?
If it’s only on the ESP, it won’t persist across reinstalls, and definitely not drive swaps.
But I do see mentions of attacking via firmware capsule. If that works, then yes, that will persist.
First result on google: https://www.circuitlab.com/
The monitor seems to be recommending you use mode 1280x1024. Have you tried that?
Either self-encrypting drives (if you trust the OEM encryption) or auto-unlock with keys in the TPM: https://wiki.archlinux.org/title/Trusted_Platform_Module#Data-at-rest_encryption_with_LUKS
Same. Well, not forced, but using Linux would just make everything more difficult. I like being able to drop to a shell and use a Linux environment with its useful utilities to manipulate stuff on my Windows PC.
Yeah, I could use mingw, but that is a pain, and I can’t just apt install
stuff.
Is that an artificial limitation that could be resolved by third-party clients?
I make it green for an ssh session, and red when I’m root. That’s it, nothing fancy.
The data on disk doesn’t get decrypted at any time. Even if they boot it, they would still need to log in somehow.
There are attacks through DMA or extracting the decryption key from RAM, but those are not going to happen by a casual laptop thief.
Delete some of the stuff you installed, and don’t install more stuff than you have space for?
You might be able to fix it by picking the most recent of all the mixed releases and running a dist-upgrade. But this is absolutely not supported or tested. But a complete reinstall is certain to fix it.
It can easily see you’re in a VM. For example, the OVMF UEFI firmware is a dead giveaway. Nobody runs that on physical hardware.
That doesn’t have anything to do with whether it’s open-source or not.