• 6 Posts
  • 379 Comments
Joined 1 year ago
cake
Cake day: December 7th, 2023

help-circle
  • Of course, no worries! For the USB route, I can provide some instructions just in case you don’t already have them (it looks like a lot, but I promise it only looks like a lot! I’m known for being quite verbose). If you end up with questions on any of this, I’m happy to answer 'em:

    • Download the ISO for the distribution that you want to use, for Linux Mint Cinnamon as was mentioned earlier, that can be found by selecting the mirror closest to you over at https://linuxmint.com/edition.php?id=319

    [This next second step is skipped by a lot of people, however, it’s best to get into the habit of actually following through with this one]

    • Typically, once the ISO is downloaded, most distributions will give you something called a “SHA256” hash, this is a unique long string of characters that is unique to a file and it allows you to verify that the file you’ve downloaded is exactly as they intend to provide (both as a “someone hasn’t tampered with it from the download source” and “to ensure the file downloaded correctly”) - if even a single byte of the file changes, then it causes the entire SHA256 hash to change. Since I don’t have a specific tool I use on Windows that I can vouch for, I’d point towards the PowerShell Get-FileHash command to do verification with, I’ll expand more at the end just in case you do want to do this [1].

    • Then it needs to get “burned” onto a USB drive, which is a bit different from just dragging the ISO file onto the drive. There’s a lot of utilities that can do this for you, my favorite is balena etcher because it is compatible with the three major operating systems (Windows, Linux, macOS) and its incredibly simple to use. Plug in your flash drive, open balena etcher, it will ask you for the ISO file, then the flash drive, and finally a “Start” button. Keep in mind, all data on the USB drive will be wiped after starting this - back up anything important you have on the USB drive!

    • With the drive plugged into the computer, reboot/start the computer and usually there will be an onscreen help text at the very start indicating a few keys that have different operations, generally one will be called “Boot Menu” (or along those lines - unfortunately its different for each mobo manufacturer, so I cannot be more specific than that - its usually either F2, F12, or DELETE/DEL), press that button a few times quickly and you should get to a screen that gives you some options, and one of them will have your USB drive in there (so long as you had it plugged in when the PC was booting - if you just plugged it in at this point, it usually won’t appear, so in that case just do this again)

    From here on, it should just boot up [2], and most distributions, including Linux Mint will just have an install option on the desktop - so long as you don’t enter that and walk through it, it won’t actually make any changes to your PC’s drive, allowing you to test drive the distro. Just be aware that some things might be a bit slower, since it is not a full install.

    [1]: I just installed PowerShell on Linux to test the Get-FileHash command so that I can make sure I explain it correctly here, definitely not something I expected to do today ha! You’ll need to open PowerShell, Windows 11 I believe uses this by default in Windows Terminal - Windows 10 you might need to search “PowerShell” in the start menu. Then at the prompt, type Get-FileHash (there is a space at the end of that), and drag the ISO file onto the Terminal window so that it automatically types out the full path to the file, then hit enter. You should get some output that looks like this:

    The Hash bit is the important part, and you’d compare that against the SHA256 hash text file that Linux Mint (or your chosen distro, most of them do have it somewhere next to the downloads) and make sure that it matches up. You can copy the hash from the windows terminal to your clipboard (highlight then right click does a copy, IIRC), then in the notepad that opens from the sha256sum.txt use Ctrl+F and paste the terminal’s hash into the find dialog, it should come up with an exact match and that saves you from having to look at each character individually (now in theory you really only have to compare the first 4 or so characters and the last 4 as its extremely rare to have those line-up while the other characters don’t, buuut just for the sake of being proper - this is how you’d do it proper). An exact match means you’re all good to go, but if it doesn’t match then that generally means that the file didn’t correctly download (or isn’t the file that you’re intended to have by the developers).

    [2]: If it doesn’t boot, its possible “Secure Boot” is getting you. You can disable (Note: warning up ahead) this in your PC’s “Setup” utility, which is another key at boot-up, though again due to each motherboard’s BIOS being different, it’s hard to provide you the exact instructions as to where its at. Linux Mint supports Secure Boot from what I’m aware of, but if you’re trying a different distribution that doesn’t support it (and are on a relatively newish computer that has it enabled) then this can stop it from booting. As a warning: Verify whether your PC is using BitLocker first before disabling Secure Boot, if it is, make sure you have the recovery key - as BitLocker might be tripped by toggling Secure Boot, and not having the recovery key if this occurs could result in having to do a complete reinstall of Windows, and losing the data within it.






  • I can’t say that I’ve heard of them, no. I don’t have any need (or desire) to do any sort of identity verification within any of my own personal projects (and I have not been involved with anything of the sorts at my workplace). Because of this, I don’t have any insight or thoughts I can provide on them unfortunately.

    In the context of Fediverse administration (or any service that you run yourself), even with a service that “handles it for you” I still personally wouldn’t want to step into any of it.



  • RussAtoProgramming@programming.devThe Copilot Delusion
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    9 days ago

    As long as it is done properly and honest, I have nothing against a “Pro” and a “Contra” article.

    Neither do I, personally. Though I am certainly less than inclined enjoy an article where the author is oddly preachy/“holier-than-thou”, sayings things such as you’re not a “real” programmer unless you sacrifice your health debugging segfaults at 3AM or have done the handmade hero challenge (certainly an interesting series to watch, but one that I have zero interest in replicating). Yet the author accuses copilot of having a superiority complex. I cannot say for sure, however I would assume if the article was in favor of AI rather than against, then there would definitely be comments about exactly this.

    The overarching tone of the article seems like if it were written as a direct comment toward a user instead, it would run afoul of beehaw’s (and surely other instances’) rules, or at the least come really close to skirting the line - and I don’t mean the parts where the author is speaking of/to copilot.


  • RussAtoAsk Lemmy@lemmy.worldDo you tag people in Lemmy?
    link
    fedilink
    English
    arrow-up
    5
    ·
    14 days ago

    No, because since it’s only a third party app implementation, tags wouldn’t follow if I go from my phone to my desktop or any other device. It also just seems kinda… Strange?

    Do you keep a journal of those you meet in-person? No judgement if you do, but if your reaction to that question was “Eww, no!” but also do user tagging I would be very curious as to what the difference is for you.

    Anyways, for problematic people they either get blocked or banned (the egregious ones) which by nature of it being a first-party feature is already synced.


  • RussAtoFediverse@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    1
    ·
    16 days ago

    According to another user in here, blocking on Mastodon actually works. So seems like it is possible to do in the Fediverse.

    I was not aware of this, but their implementation of how they do this does bring up the limitation I mentioned. The other user cannot see your posts only if you are on the same server:

    If you and the blocked user are on the same server, the blocked user will not be able to view your posts on your profile while logged in.

    I actually thought blocks were public already.

    They’re not, well - the operator of your instance could go into the database and view it that way in the same way that they can see your email address. But aside from someone who has database access to your instance, blocks are not public. What is public is the list of defederated (“blocked” so to speak) instances for an entire instance (this can be viewed by going to /instances of any instance), which might be what you were thinking of?

    And personally I don’t see how it would be an issue if people that I haven’t blocked can see who I’ve blocked.

    How exactly would you enforce that, though? If your blocks were public, all the person who you’ve blocked would need to do is open a private browsing window and look at your profile to see that they’ve been blocked.

    If we’re looking at blocks as being a safety feature, I would think that having your blocks broadcasted to every single instance would be classified as harmful and a breach of your privacy. This is why although an instance that you register with has to have your email address that you signed up with, they don’t broadcast it to all other instances (same with the encrypted value of your password) - because otherwise it would effectively be public.

    Perhaps I’ve just got the wrong stance, but considering that you can never block someone from viewing your content with an absolute guarantee (if the blocks were broadcasted, you still couldn’t prevent someone from just simply logging out, or standing up their own instance and collecting the data anyways) I would not consider that tradeoff to be worthwhile. Not that my stance has any weight since I’m not a maintainer for Lemmy (or any of the Fediverse software), but I wouldn’t be surprised if that has at least come up to those who are developing the various Fediverse software.


  • RussAtoFediverse@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    1
    ·
    16 days ago

    Aside from the rest of the discussion that has already occurred here, I’m not actually sure how this would work from a technical perspective.

    You and I are on two completely different instances, if I were to block you, how is your instance supposed to know this in order to stop you from reading my comment?

    The only way I could see that working is if the list of users you blocked were federated too, and effectively made public (like votes currently are) - which seems counterproductive to the problem at hand.

    Then what happens if you post in a community where someone you’ve blocked is a moderator? Or if you block the admin of another instance? If you can “cloak” yourself from being moderated by just blocking them, that seems like an exploit waiting to happen. As far as I’m aware, on Reddit blocking a user doesn’t hide your comments from them - but they can no longer reply to them, and I assume this is why that is the case. Unless that has very recently changed.

    The biggest difference between Lemmy (and all software within the Fediverse - for example, I’m pretty sure Mastodon is this way as well), is that there is not one singular authoritative server. Actions like this need to be handled on all instances, and that’s impossible to guarantee. A bad actor running an instance could just rip out the function that handles this, and then it’s moot. I mean, they wouldn’t even need to do that - they’d have the data anyways.

    You could enforce it if both users are on the same instance I suppose, but this just seems like it would only land with the blocking feature being even more inconsistent.


  • I’ve been pretty busy over the last couple of weeks, so gaming has been very sparse… But, the other day I picked up “The Slormancer” which is an ARPG created by a team of two indie developers.

    I absolutely love it so far! Plays fantastic on the Steam Deck too (and really almost feels like it was made for the OLED Deck). I only have three and a half hours so far in it, but it’s very much giving me “Just one last round” vibes, which are my favorite kinds of games.


  • RussAtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    25 days ago

    How is that the case? I’ve got pretty much zero experience with decompiling software, but I can’t say I’ve ever heard anyone who does say that before. I genuinely can’t imagine that it’s easier to work with say, decompiling a game to make changes to it rather than just having the source available for it.

    I suppose unless the context is just regarding running software then of course it’s easier to just run a binary that’s already a binary - but then I’m not sure I see where decompiling comes into relevance.


  • I don’t see how that’s going to work out well. That’s asking to end up with a mess that you’re just going to have to rewrite anyways.

    I do not even have a complete hatred for AI like a lot of folks do, but I don’t trust it that much (nor should anyone).

    You’d be better off with an actual deterministic transpiler for that (think TypeScript -> JS but the other way around I suppose), not something with a ton of random variables like an AI.




  • I can’t say that I’ve tried to do that directly (I’m unfortunately not at my steam deck this moment to test), however I’ve been disconnected from the game servers before whenever they have to apply a server-side fix (or during general server issues) and it allowed me to rejoin without relaunching the entire game. So I imagine an Internet drop from putting the deck to sleep would be treated the same and not require a relaunch, unless maybe you’ve put it to sleep for an extended period of time (such as 24 hours) causing an authentication token of sorts to expire.

    So far I’ve only had to do a full relaunch whenever there is a new patch available (if you try to rejoin instantly it’ll just tell you to update the game).

    EHG has been putting a lot of focus on Deck related stuff, so I suspect even if it does cause a relaunch they’d be receptive to feedback to try to find a workaround on their side if possible.


  • This can sometimes come at the cost of intuitiveness however. As an example that just happened to me the other day, I was using Pinta which uses libadwaita and had opened an image to make some modifications to it.

    All was going well until I wanted to save a new copy of it (and not override the original). The toolbar has all of these functions on it, open, save, undo/redo, etc… but not Save As.

    Apparently there’s a tiny little overflow button on the far right side, click it and you get a whole bunch of functions - one of them being the holy “Save As” option I was looking for. I almost went down the route of making a copy of the image outside Pinta and then just overwriting the original.

    Apparently the idea of making a copy of an image is blasphemy. Even Microsoft Word when they had first moved to the Ribbon UI made the save button have a little dropdown right under the save option to reveal Save As.

    Don’t get me wrong, I love how some libadwaita apps look. Mission Center for example? Chef’s Kiss - but it’s a very simple application that all I need to do is open it to have a quick look at the very pretty looking graphs. Although the latest update seems to have gotten rid of being able to have the sidebar open persistently (now taking an extra click to change between performance graphs)… But I still need to double check to see if that’s intended vs being a bug before I judge that too harshly.