Linux - Reddit – Telegram
Linux - Reddit
773 subscribers
4.19K photos
207 videos
39.9K links
Stay up-to-date with everything Linux!
Content directly fetched from the subreddit just for you.

Powered by : @r_channels
Download Telegram
# 7
Will a desktop independent utilities like EasyStroke (custom gestures) and xdotool ever be possible on Wayland?

Also how do stuff like clipboards work? Are they all compositor specific too?

https://redd.it/cswdkt
@r_linux
PSA: Reddit Bug affecting comments/posting

PSA:

Reddit seems to have a sitewide bug on commenting at the least, possibly submitting:

https://www.reddit.com/r/bugs/comments/cssy0m/comments_arent_showing_up/

/r/ModSupport/comments/cst2rr/psa_theres_a_reddit_bug_going_around_not_showing/

So far the admins haven't provided news. Please be aware that your comments may not show up and there's nothing the mods can do at this time.

https://redd.it/ct0cxk
@r_linux
When your local curry house is open source
https://redd.it/ct2moy
@r_linux
Video tutorials for Linux and shell beginners

I created some videos for linux beginners but also to give a very short overview about certain topics:

[https://www.youtube.com/playlist?list=PLoyqj2DFcXcaD-QrYPZRqTpLZ8\_rkyOKU](https://www.youtube.com/playlist?list=PLoyqj2DFcXcaD-QrYPZRqTpLZ8_rkyOKU)

I would like to get some feedback about the videos here and also some ideas what would be worth a video.

I played around with the voice. My final choice is to use Amazon aws for text to speech. I am not a native english speaker ;)

https://redd.it/ct45mv
@r_linux
Reflinks vs symlinks vs hard links, and how they can help machine learning projects

A new type of link, the Reflink (copy-on-write), is starting to be available in newer releases of Mac OS X (APFS) and Linux (BTRFS, XFS, OCFS2, with the desired filesystem driver). The following article explains use each of them in turn and see how well they work for managing machine learning projects when setting up new experiments, to rearrange data files quickly and efficiently while avoiding the risk of polluting the data files with erroneous edits: [Reflinks vs symlinks vs hard links, and how they can help machine learning projects](https://hackernoon.com/reflinks-vs-symlinks-vs-hard-links-and-how-they-can-help-machine-learning-projects-wz2ej3xa7)

https://redd.it/ct26qb
@r_linux
Can anyone point me to see good video resources for learning SED and AWK?

I've realized I need to up my game. Anyone have some good resources?

https://redd.it/ct7bc1
@r_linux
[Tutorial for beginners] GnuPG: how to export, import, delete and revoke your keys

Hello, friends!

​

In my first [post](https://www.reddit.com/r/linux/comments/creb29/tutorial_for_beginners_how_to_install_and_use/), I taught you how to install, create and use GnuPG keys on GNU/Linux. Now, this tutorial is a reference to export, import, delete and revoke any GPG key. This is very useful when you work as system administrator and employees working in your company need to have their keys saved in the servers.

For this tutorial, I'm going to use the parameter `--armour` (you can use it without letter 'u'). But, why? Some times, you need a readable file (file in text format, similar to .TXT, or any other plain text format) for a specific situation, for example, include your public key in your GitHub account. It's up to you if you want to use or not the *armour* parameter.

Let's start!

Open a terminal and list your keys:

$ gpg --list-keys

https://i.redd.it/76pz3v7vloh31.png

Did you get a return? Are your keys listed?

If no, please read my [first post](https://www.reddit.com/r/linux/comments/creb29/tutorial_for_beginners_how_to_install_and_use/).

If yes, here is the first step: export your keys (public and private) and create your revocation certificate.

Maybe, you are asking to yourself: what is this revocation certificate?

In the worst case scenario, someone discovered your GnuPG password and, somehow, got your keys. Unhappily, they are compromised. A revocation certificate makes your keys become useless.

There's one thing I'd like to let you know: once you try to export any key (and revocation certificate), the default output is redirected to the screen, but we need to save it into a file. The parameter `--output` is used to redirect this output from your screen to a file. There's another way you can redirect it: with `> filename`, for example: `gpg --export` `john.doe@email.com` `> public.key`. With this in mind, type the commands bellow:

$ gpg --armour --output public-key.asc --export john.doe@email.com
$ gpg --armour --output private-key.asc --export-secret-keys john.doe@email.com
# Type your GnuPG password
$ gpg --armour --output revoke.asc --generate-revocation john.doe@email.com
# This command is going to ask you about the reason why you're creating a revocation certificate.
# Select the option, press ENTER and write an optional denoscription.
# Later, confirm with 'y'.
# Type your GnuPG password

https://i.redd.it/6p2hassmmoh31.png

Now, you can send your public key to someone you trust. And keep your keys and certificate save in an external hard drive. Just send (and use) your revocation certificate once your keys are compromised. Otherwise, keep it with you.

To see how the revoke process works, you can do this:

* List your keys with `gpg --list-keys`.
* You can see lines starting with 'pub', 'uid' and 'sub'.
* In the line 'uid', it mentions the trust of this key, like *\[ultimate\]*, and your personal denoscription (full name, comment and email).
* Type:
* $ gpg --import revoke.asc
* The output in your screen is informing you that it was processed with success.
* Now, list again you keys. The 'sub' line disappeared and the 'uid' line is informing you that your key is *\[revoked\]* (check it with `gpg --list-keys`).

https://i.redd.it/klw5qd00noh31.png

Once it's done, delete your GPG key with the command bellow:

$ gpg --delete-secret-and-public-keys john.doe@email.com

GnuPG is going to ask you (with 'yes-no' prompt) to continue. Confirm all questions that are prompted to you.

https://i.redd.it/j65msulcnoh31.png

After that, you can try list again (`gpg --list-keys`) and you're going to see two lines which say:

>***gpg: checking the trustdb***
>
>***gpg: no ultimately trusted keys found***

These lines above mean that your system doesn't have any key, because you deleted them.

Now, the last step: how to import any GnuPG key to your system.

Type in your terminal:

$ gpg --import public-key.asc
$ gpg --import --allow-secret-key-impor
t private-key.asc
# Type your GnuPG password

https://i.redd.it/0f4sd30nnoh31.png

Once your keys were imported, you need to edit and trust them.

$ gpg --edit-key john.doe@email.com
# Type 'trust' (without quotes)
# Select an option depending on how much do you trust this key you're importing
# Confirm with 'y'
# Then type quit

https://i.redd.it/eyvly4wrqoh31.png

With these commands, you learned the basics about import (and trust keys), export, revoke and delete GPG keys.

If you have any question about this tutorial, just ask me here in the comments.

​

Thank you!

https://redd.it/ct7yjr
@r_linux
Introduction & Desktop

Hello. My name is Roy, I'm 17, and I fully switched to Linux a month ago.


I've been using Linux on older laptops for years, as well as embedded systems like the Raspberry Pi. I finally made the switch when Windows decided to crap out on me again. I got tired of the broken updates.

​

In the past I've used Ubuntu & Derivatives, Debian, Fedora, vanilla Arch, and I've also dabbled in LFS.


In order to make the full switch easier I defaulted to Linux Mint. I am happy to say, though, I have done some customizing in my desktop. See the attached images for the desktop & system info.


[My desktop](https://i.redd.it/3k5j9w5wxoh31.png)

[Desktop with Neofetch info](https://i.redd.it/aurbnyk5yoh31.png)

https://redd.it/ct8hwj
@r_linux