Is oh-my-zsh safe?
Hello folks,
I have kinda unsual question.
How much is oh-my-zsh safe, yes basicly it is just bunch of tweaks to standard zsh and some other things. So question is can we really trust to oh-my-zsh team, is it safe to deploy it and what are your opinion to this?
Thanks for any answers
https://redd.it/e4fwk3
@r_linux
Hello folks,
I have kinda unsual question.
How much is oh-my-zsh safe, yes basicly it is just bunch of tweaks to standard zsh and some other things. So question is can we really trust to oh-my-zsh team, is it safe to deploy it and what are your opinion to this?
Thanks for any answers
https://redd.it/e4fwk3
@r_linux
reddit
Is oh-my-zsh safe?
Hello folks, I have kinda unsual question. How much is oh-my-zsh safe, yes basicly it is just bunch of tweaks to standard zsh and some other...
Thermal testing Raspberry Pi 4
https://www.raspberrypi.org/blog/thermal-testing-raspberry-pi-4/
https://redd.it/e4nzdd
@r_linux
https://www.raspberrypi.org/blog/thermal-testing-raspberry-pi-4/
https://redd.it/e4nzdd
@r_linux
Raspberry Pi
Thermal testing Raspberry Pi 4 - Raspberry Pi
Raspberry Pi 4 just got a lot cooler! The last four months of firmware updates have taken over half a watt out of idle power and nearly a watt out of fully loaded power
Linux Experiences/Rants or Education/Certifications thread - December 02, 2019
Welcome to r/linux rants and experiences! This megathread is also to hear opinions from anyone just starting out with Linux or those that have used Linux (GNU or otherwise) for a long time.
Let us know what's annoying you, whats making you happy, or something that you want to get out to r/linux but didn't make the cut into a full post of it's own.
For those looking for certifications please use this megathread to ask about how to get certified whether it's for the business world or for your own satisfaction. Be sure to check out r/linuxadmin for more discussion in the SysAdmin world!
_Please keep questions in r/linuxquestions, r/linux4noobs, or the Wednesday automod thread._
https://redd.it/e4tfzz
@r_linux
Welcome to r/linux rants and experiences! This megathread is also to hear opinions from anyone just starting out with Linux or those that have used Linux (GNU or otherwise) for a long time.
Let us know what's annoying you, whats making you happy, or something that you want to get out to r/linux but didn't make the cut into a full post of it's own.
For those looking for certifications please use this megathread to ask about how to get certified whether it's for the business world or for your own satisfaction. Be sure to check out r/linuxadmin for more discussion in the SysAdmin world!
_Please keep questions in r/linuxquestions, r/linux4noobs, or the Wednesday automod thread._
https://redd.it/e4tfzz
@r_linux
reddit
Linux Experiences/Rants or Education/Certifications thread -...
Welcome to r/linux rants and experiences! This megathread is also to hear opinions from anyone just starting out with Linux or those that have...
Bliss OS 12 Allow Users to Run Android 10 on Linux or Windows 10 PC
https://techdator.net/bliss-os-12-allow-users-to-run-android-10-on-linux-or-windows-10-pc/
https://redd.it/e4x2sg
@r_linux
https://techdator.net/bliss-os-12-allow-users-to-run-android-10-on-linux-or-windows-10-pc/
https://redd.it/e4x2sg
@r_linux
TechDator
Bliss OS 12 Allow Users to Run Android 10 on Linux or Windows 10 PC – TechDator
Finally the stunning Bliss OS 12 comes to the market in the beta format which lets users run stuff simultaneously on any and all platforms.
LUKS unlock with TPM2 - A guide with noscripts
[I created a detailed walkthrough](https://github.com/anguianoewi/tpm2KeyUnlock) complete with instructions to fight issues I had during installation.
Over thanksgiving vacation, I spent a couple all-nighters setting up TPM2 unlock on my computer. After looking for different solutions, [This article for TPM2 unlock](https://threat.tevora.com/secure-boot-tpm-2/) seemed to be the most convenient and transparent for me. However, the article is outdated and the tools have been updated, so the information is more of a proof-of-concept rather than implementation.
The process should take no more than 20 minutes, and so far I have managed to recreate it with the included noscripts in less than 10 minutes.
There are a couple issues I still have to work on with the noscripts. The manual walkthrough itself works fine. The rest of the issues are listed in the readme.
If there are any issues with the process, I would appreciate issue tickets so I can work on them. Of course, if anyone is willing to help contribute, I would be more than thankful.
https://redd.it/e527qs
@r_linux
[I created a detailed walkthrough](https://github.com/anguianoewi/tpm2KeyUnlock) complete with instructions to fight issues I had during installation.
Over thanksgiving vacation, I spent a couple all-nighters setting up TPM2 unlock on my computer. After looking for different solutions, [This article for TPM2 unlock](https://threat.tevora.com/secure-boot-tpm-2/) seemed to be the most convenient and transparent for me. However, the article is outdated and the tools have been updated, so the information is more of a proof-of-concept rather than implementation.
The process should take no more than 20 minutes, and so far I have managed to recreate it with the included noscripts in less than 10 minutes.
There are a couple issues I still have to work on with the noscripts. The manual walkthrough itself works fine. The rest of the issues are listed in the readme.
If there are any issues with the process, I would appreciate issue tickets so I can work on them. Of course, if anyone is willing to help contribute, I would be more than thankful.
https://redd.it/e527qs
@r_linux
GitHub
anguianoewi/tpm2KeyUnlock
Adds an automated unlock function based on TPM policy installation - anguianoewi/tpm2KeyUnlock
Netdata release v1.19
Hey all,
Introducing a major rewrite of our web log collector, [cmocka](https://www.facebook.com/hashtag/cmocka?source=feed_text&epa=HASHTAG&__xts__%5B0%5D=68.ARDKJpuwODv-hPc236C7fM2r9vCYx9vTJeH93a18odECvej08YhKL8yikqtkH5YC0qIPbakDgFmmf15tnogjIj3cf_Wya85PQYEzfw9Y2OUmmX9y_0GfH_ikrxDZS109LzcjMTWo8zoUXSy893FBfR0_AxyBw6IFCcIkBObQiTOtCIjrxws3vt14_Jg5s_H61VJwB_KoiG9hPRXpuA6vV5Vm9rUSZUwM0KpucD6_6XrlRI2xwd7Sz5M_3Arnkqr4DckHC5NXNGGTVMUYJgz2H3mq1KcdwguQvlsigL2Pz4k6QW1ZCCYCvG21xk1UzcDAEEr15Yqxx-AEGa1AlNoxRqzZc8MM&__tn__=%2ANK-R) unit testing, improvements on our [Unbound](https://www.facebook.com/hashtag/unbound?source=feed_text&epa=HASHTAG&__xts__%5B0%5D=68.ARDKJpuwODv-hPc236C7fM2r9vCYx9vTJeH93a18odECvej08YhKL8yikqtkH5YC0qIPbakDgFmmf15tnogjIj3cf_Wya85PQYEzfw9Y2OUmmX9y_0GfH_ikrxDZS109LzcjMTWo8zoUXSy893FBfR0_AxyBw6IFCcIkBObQiTOtCIjrxws3vt14_Jg5s_H61VJwB_KoiG9hPRXpuA6vV5Vm9rUSZUwM0KpucD6_6XrlRI2xwd7Sz5M_3Arnkqr4DckHC5NXNGGTVMUYJgz2H3mq1KcdwguQvlsigL2Pz4k6QW1ZCCYCvG21xk1UzcDAEEr15Yqxx-AEGa1AlNoxRqzZc8MM&__tn__=%2ANK-R) collector and even more! Check out our blog post for full details or read our release notes below.
Release v1.19.0 contains 2 new collectors, 19 bug fixes, 17 improvements, and 19 documentation updates. Full release notes can be found [here](https://github.com/netdata/netdata/releases/tag/v1.19.0).
**At a glance**
We completed a major rewrite of our web log collector to dramatically improve its flexibility and performance. The [new collector](https://github.com/netdata/go.d.plugin/pull/141), written entirely in Go, can parse and chart logs from Nginx and Apache servers, and combines numerous improvements. Netdata now supports the LTSV log format, creates charts for TLS and cipher usage, and is amazingly fast. In a test using SSD storage, the collector parsed the logs for 200,000 requests in about 200ms, using 30% of a single core.
This Go-based collector also has powerful custom log parsing capabilities, which means we're one step closer to a generic application log parser for Netdata. We're continuing to work on this parser to support more application log formatting in the future.
We have a new tutorial on [enabling the Go web log collector](https://docs.netdata.cloud/docs/tutorials/collect-apache-nginx-web-logs/) and using it with Nginx and/or Apache access logs with minimal configuration. Thanks to [Wing924](https://github.com/Wing924) for starting the Go rewrite!
We introduced more **cmocka unit testing** to Netdata. In this release, we're testing how Netdata's internal web server processes HTTP requests—the first step to improve the quality of code throughout, reduce bugs, and make refactoring easier. We wanted to validate the web server's behavior but needed to build a layer of parametric testing on top of the CMocka test runner. Read all about our process of testing and selecting cmocka on our blog post: [Building an agile team's 'safety harness' with cmocka and FOSS](https://blog.netdata.cloud/agile-team-cmocka-foss/).
Netdata's **Unbound collector** was also [completely rewritten in Go](https://github.com/netdata/go.d.plugin/pull/287) to improve how it collects and displays metrics. This new version can get dozens of metrics, including details on queries, cache, uptime, and even show per-thread metrics. See our [tutorial](https://docs.netdata.cloud/docs/tutorials/collect-unbound-metrics/) on enabling the new collector via Netdata's amazing auto-detection feature.
We [fixed an error](https://github.com/netdata/netdata/pull/7220) where **invalid spikes** appeared on certain charts by improving the incremental counter reset/wraparound detection algorithm.
Netdata can now send [**health alarm notifications to IRC channels**](https://docs.netdata.cloud/health/notifications/irc/) thanks to [Strykar](https://github.com/Strykar)!
And, Netdata can now monitor [**AM2320 sensors**](https://docs.netdata.cloud/collectors/python.d.plugin/am2320/), thanks to hard work from [Tom Buck](https://github.com/tommybuck).
**Improvements**
* **New Collectors**
* AM2320 sensor collector plugin
Hey all,
Introducing a major rewrite of our web log collector, [cmocka](https://www.facebook.com/hashtag/cmocka?source=feed_text&epa=HASHTAG&__xts__%5B0%5D=68.ARDKJpuwODv-hPc236C7fM2r9vCYx9vTJeH93a18odECvej08YhKL8yikqtkH5YC0qIPbakDgFmmf15tnogjIj3cf_Wya85PQYEzfw9Y2OUmmX9y_0GfH_ikrxDZS109LzcjMTWo8zoUXSy893FBfR0_AxyBw6IFCcIkBObQiTOtCIjrxws3vt14_Jg5s_H61VJwB_KoiG9hPRXpuA6vV5Vm9rUSZUwM0KpucD6_6XrlRI2xwd7Sz5M_3Arnkqr4DckHC5NXNGGTVMUYJgz2H3mq1KcdwguQvlsigL2Pz4k6QW1ZCCYCvG21xk1UzcDAEEr15Yqxx-AEGa1AlNoxRqzZc8MM&__tn__=%2ANK-R) unit testing, improvements on our [Unbound](https://www.facebook.com/hashtag/unbound?source=feed_text&epa=HASHTAG&__xts__%5B0%5D=68.ARDKJpuwODv-hPc236C7fM2r9vCYx9vTJeH93a18odECvej08YhKL8yikqtkH5YC0qIPbakDgFmmf15tnogjIj3cf_Wya85PQYEzfw9Y2OUmmX9y_0GfH_ikrxDZS109LzcjMTWo8zoUXSy893FBfR0_AxyBw6IFCcIkBObQiTOtCIjrxws3vt14_Jg5s_H61VJwB_KoiG9hPRXpuA6vV5Vm9rUSZUwM0KpucD6_6XrlRI2xwd7Sz5M_3Arnkqr4DckHC5NXNGGTVMUYJgz2H3mq1KcdwguQvlsigL2Pz4k6QW1ZCCYCvG21xk1UzcDAEEr15Yqxx-AEGa1AlNoxRqzZc8MM&__tn__=%2ANK-R) collector and even more! Check out our blog post for full details or read our release notes below.
Release v1.19.0 contains 2 new collectors, 19 bug fixes, 17 improvements, and 19 documentation updates. Full release notes can be found [here](https://github.com/netdata/netdata/releases/tag/v1.19.0).
**At a glance**
We completed a major rewrite of our web log collector to dramatically improve its flexibility and performance. The [new collector](https://github.com/netdata/go.d.plugin/pull/141), written entirely in Go, can parse and chart logs from Nginx and Apache servers, and combines numerous improvements. Netdata now supports the LTSV log format, creates charts for TLS and cipher usage, and is amazingly fast. In a test using SSD storage, the collector parsed the logs for 200,000 requests in about 200ms, using 30% of a single core.
This Go-based collector also has powerful custom log parsing capabilities, which means we're one step closer to a generic application log parser for Netdata. We're continuing to work on this parser to support more application log formatting in the future.
We have a new tutorial on [enabling the Go web log collector](https://docs.netdata.cloud/docs/tutorials/collect-apache-nginx-web-logs/) and using it with Nginx and/or Apache access logs with minimal configuration. Thanks to [Wing924](https://github.com/Wing924) for starting the Go rewrite!
We introduced more **cmocka unit testing** to Netdata. In this release, we're testing how Netdata's internal web server processes HTTP requests—the first step to improve the quality of code throughout, reduce bugs, and make refactoring easier. We wanted to validate the web server's behavior but needed to build a layer of parametric testing on top of the CMocka test runner. Read all about our process of testing and selecting cmocka on our blog post: [Building an agile team's 'safety harness' with cmocka and FOSS](https://blog.netdata.cloud/agile-team-cmocka-foss/).
Netdata's **Unbound collector** was also [completely rewritten in Go](https://github.com/netdata/go.d.plugin/pull/287) to improve how it collects and displays metrics. This new version can get dozens of metrics, including details on queries, cache, uptime, and even show per-thread metrics. See our [tutorial](https://docs.netdata.cloud/docs/tutorials/collect-unbound-metrics/) on enabling the new collector via Netdata's amazing auto-detection feature.
We [fixed an error](https://github.com/netdata/netdata/pull/7220) where **invalid spikes** appeared on certain charts by improving the incremental counter reset/wraparound detection algorithm.
Netdata can now send [**health alarm notifications to IRC channels**](https://docs.netdata.cloud/health/notifications/irc/) thanks to [Strykar](https://github.com/Strykar)!
And, Netdata can now monitor [**AM2320 sensors**](https://docs.netdata.cloud/collectors/python.d.plugin/am2320/), thanks to hard work from [Tom Buck](https://github.com/tommybuck).
**Improvements**
* **New Collectors**
* AM2320 sensor collector plugin
Facebook
#cmocka | Facebook
View about #cmocka on Facebook. Facebook gives people the power to share and makes the world more open and connected.
* Added parsing of /proc/pagetypeinfo to provide metrics on fragmentation of free memory pages
* The unbound collector module was completely rewritten, in Go [go.d.plugin/#287](https://github.com/netdata/go.d.plugin/pull/287)
**Collector improvements**
* **We rewrote our web log parser in Go, drastically improving its flexibility and performance**
* The [Kubernetes kubelet collector](https://docs.netdata.cloud/collectors/go.d.plugin/modules/k8s_kubelet/) now reads the service account token and uses it for authorization. We also added a new default job to collect metrics from https://localhost:10250/metrics
* Added a new default job to the [Kubernetes coredns](https://docs.netdata.cloud/collectors/go.d.plugin/modules/coredns/) collector to collect metrics from [http://kube-dns.kube-system.svc.cluster.local:9153/metrics](http://kube-dns.kube-system.svc.cluster.local:9153/metrics)
* apps.plugin: Synced FRRouting daemons configuration with the frr 7.2 release
* apps.plugin: Added process group for git-related processes-apps.plugin: Added balena to the container-engines application group
* web\_log: Treat 401 Unauthorized requests as successful
* xenstat.plugin: Prepare for xen 4.13 by checking for check xenstat\_vbd\_errorpresence
* mysql: Added galera cluster\_statusalarm
* **Metrics Database**
* Netdata generates alarms if the disk cannot keep up with data collection
* **Health**
* Fine tune various default alarm configurations
* Update SYN cookie alarm to be less aggressive
* Added support for IRC alarm notifications
* **Installation/Packages**
* Corrected the Makefile.am files indentation, to prevent unexpected errors
* Rationalized ownership and permissions of /etc/netdata
* Made various improvements to the installer noscript netdata-installer.sh
* Include go.d.plugin version v0.11.0
* **Other**
* Improve Travis build warnings
* cmocka testing for http requests
* CI/CD: Prevented nightly jobs from timing out
https://redd.it/e54cn3
@r_linux
* The unbound collector module was completely rewritten, in Go [go.d.plugin/#287](https://github.com/netdata/go.d.plugin/pull/287)
**Collector improvements**
* **We rewrote our web log parser in Go, drastically improving its flexibility and performance**
* The [Kubernetes kubelet collector](https://docs.netdata.cloud/collectors/go.d.plugin/modules/k8s_kubelet/) now reads the service account token and uses it for authorization. We also added a new default job to collect metrics from https://localhost:10250/metrics
* Added a new default job to the [Kubernetes coredns](https://docs.netdata.cloud/collectors/go.d.plugin/modules/coredns/) collector to collect metrics from [http://kube-dns.kube-system.svc.cluster.local:9153/metrics](http://kube-dns.kube-system.svc.cluster.local:9153/metrics)
* apps.plugin: Synced FRRouting daemons configuration with the frr 7.2 release
* apps.plugin: Added process group for git-related processes-apps.plugin: Added balena to the container-engines application group
* web\_log: Treat 401 Unauthorized requests as successful
* xenstat.plugin: Prepare for xen 4.13 by checking for check xenstat\_vbd\_errorpresence
* mysql: Added galera cluster\_statusalarm
* **Metrics Database**
* Netdata generates alarms if the disk cannot keep up with data collection
* **Health**
* Fine tune various default alarm configurations
* Update SYN cookie alarm to be less aggressive
* Added support for IRC alarm notifications
* **Installation/Packages**
* Corrected the Makefile.am files indentation, to prevent unexpected errors
* Rationalized ownership and permissions of /etc/netdata
* Made various improvements to the installer noscript netdata-installer.sh
* Include go.d.plugin version v0.11.0
* **Other**
* Improve Travis build warnings
* cmocka testing for http requests
* CI/CD: Prevented nightly jobs from timing out
https://redd.it/e54cn3
@r_linux
cron.weekly is back
For those not aware, [cron.weekly](https://ma.ttias.be/cron-weekly-is-coming-back/) was, well now is again a weekly newsletter covering various linux topics distributed VIA email.
For those learning linux I suggest you check this newsletter out.
[Archive](https://ma.ttias.be/cronweekly/) going back to 2015.
https://redd.it/e54rgz
@r_linux
For those not aware, [cron.weekly](https://ma.ttias.be/cron-weekly-is-coming-back/) was, well now is again a weekly newsletter covering various linux topics distributed VIA email.
For those learning linux I suggest you check this newsletter out.
[Archive](https://ma.ttias.be/cronweekly/) going back to 2015.
https://redd.it/e54rgz
@r_linux
ma.ttias.be
cron.weekly is coming back!
Once upon a time I wrote a weekly newsletter on Linux, open source & web development.
PinePhone: Everything you need to know about the $150 Linux-powered phone
https://www.androidauthority.com/pine64-pinephone-1053395/
https://redd.it/e56ppy
@r_linux
https://www.androidauthority.com/pine64-pinephone-1053395/
https://redd.it/e56ppy
@r_linux
Android Authority
Pine64 PinePhone is a $150 Linux phone that breaks the mold
The Pine64 PinePhone is a $150 smartphone with specs to match, but this device offers something most other mass market handsets can't — it runs Linux.
Librem 5 backers have begun receiving their Linux phones
https://arstechnica.com/gadgets/2019/12/librem-5-backers-receiving-their-linux-phones/
https://redd.it/e56spy
@r_linux
https://arstechnica.com/gadgets/2019/12/librem-5-backers-receiving-their-linux-phones/
https://redd.it/e56spy
@r_linux
Ars Technica
Librem 5 backers have begun receiving their Linux phones
The first Librem 5 backers have begun receiving mostly working prototype devices.
Purism Releases Hardware Schematics for Librem 5 Linux Phone
https://puri.sm/posts/a-different-kind-of-transparency/
What do you think? How momentous is this? Is this the start of a new era for smartphones? What do you think of Purism’s design? Why are they having issues with heat? What will it take to fix it?
https://redd.it/e581b8
@r_linux
https://puri.sm/posts/a-different-kind-of-transparency/
What do you think? How momentous is this? Is this the start of a new era for smartphones? What do you think of Purism’s design? Why are they having issues with heat? What will it take to fix it?
https://redd.it/e581b8
@r_linux
Purism
A Different Kind of Transparency – Purism
Purism — Private and Secure Hardware, Software, and Services
Tool: I wrote a realtime regex extractor and data-aggregator
This is a bit of a x-post from /r/golang, but I thought folks here might find use for this.
I wanted to share a tool I wrote recently which was driven partly because of some technical issues I've faced recently (Lots of large-scale log parsing), and some frustration with existing tools in my toolkit. I ended up writing a small go cli app to run a regex and extract/summarize data in various formats (histogram, table, numerical summary, etc) in a performant way. This solved the problem of getting incremental output while parsing the files, along with an easy to learn syntax for aggregating the data (as long as your pretty good at regex..)
Here's a moderately complex example of parsing a nginx access log. There are three parts in this example: -m
the match extractor (regex), -e the key expression and -i to ignore a truthy expression. The below example gets all the paths and their statuses, ignoring 200, and outputs the results.
$ rare histo -m '"(\w{3,4}) ([A-Za-z/.]+).*" (\d{3})' -e '{3} {1} {2}' -i '{eq {3} 200}' -b access.log
404 GET /robots.txt 728 ||||||||||||||||||||||||||||||||||||||||||||||||||
404 GET /favicon.ico 109 |||||||
304 GET / 52 |||
301 GET /mirror 11
403 GET /mirror/distros/cup/ 7
Matched: 941 / 161,622 (Ignored: 160,681)
Groups: 23
There's a lot of features (gunzip, json, asthmatic, etc), but I don't want to bloat this post, so check the links below.
I'm posting here for two reasons. 1) I'm hoping that someone will see this and find it helpful or useful and 2) I'm not a go expert by any stretch, and am definitely open to language or functional input!
I've spent a lot of time optimizing the performance characteristics of the program to be comparable to other similar applications (Learned a lot about go's pprof along the way). I also tried to bundle it up in all the popular formats (deb, rpm, tar, homebrew)
Always happy to hear feedback!
Github: [https://github.com/zix99/rare](https://github.com/zix99/rare)
Post (With lots of examples): [https://www.zdyn.net/projects/2019/11/17/rare.html](https://www.zdyn.net/projects/2019/11/17/rare.html)
https://redd.it/e58l7q
@r_linux
This is a bit of a x-post from /r/golang, but I thought folks here might find use for this.
I wanted to share a tool I wrote recently which was driven partly because of some technical issues I've faced recently (Lots of large-scale log parsing), and some frustration with existing tools in my toolkit. I ended up writing a small go cli app to run a regex and extract/summarize data in various formats (histogram, table, numerical summary, etc) in a performant way. This solved the problem of getting incremental output while parsing the files, along with an easy to learn syntax for aggregating the data (as long as your pretty good at regex..)
Here's a moderately complex example of parsing a nginx access log. There are three parts in this example: -m
the match extractor (regex), -e the key expression and -i to ignore a truthy expression. The below example gets all the paths and their statuses, ignoring 200, and outputs the results.
$ rare histo -m '"(\w{3,4}) ([A-Za-z/.]+).*" (\d{3})' -e '{3} {1} {2}' -i '{eq {3} 200}' -b access.log
404 GET /robots.txt 728 ||||||||||||||||||||||||||||||||||||||||||||||||||
404 GET /favicon.ico 109 |||||||
304 GET / 52 |||
301 GET /mirror 11
403 GET /mirror/distros/cup/ 7
Matched: 941 / 161,622 (Ignored: 160,681)
Groups: 23
There's a lot of features (gunzip, json, asthmatic, etc), but I don't want to bloat this post, so check the links below.
I'm posting here for two reasons. 1) I'm hoping that someone will see this and find it helpful or useful and 2) I'm not a go expert by any stretch, and am definitely open to language or functional input!
I've spent a lot of time optimizing the performance characteristics of the program to be comparable to other similar applications (Learned a lot about go's pprof along the way). I also tried to bundle it up in all the popular formats (deb, rpm, tar, homebrew)
Always happy to hear feedback!
Github: [https://github.com/zix99/rare](https://github.com/zix99/rare)
Post (With lots of examples): [https://www.zdyn.net/projects/2019/11/17/rare.html](https://www.zdyn.net/projects/2019/11/17/rare.html)
https://redd.it/e58l7q
@r_linux
GitHub
GitHub - zix99/rare: Create terminal-based histograms, bar graphs, tables, heatmaps and more in realtime using regex and expressions.
Create terminal-based histograms, bar graphs, tables, heatmaps and more in realtime using regex and expressions. - zix99/rare
Going back to Windows is not an option! A month into my switch to Manjaro KDE
I have my machine dual-booted but I haven't gone back to the Windows installation. I don't want to. I will put up with any of the glitches and bugs with the Nvidia drivers and such. I haven't got much to say; I could go into a rant about how much I hate Windows and never realized it but, that would make this post be a novel and I think that it is very well covered on this sub. I will just say that every time that I have to use Windows (like at school or in a VM for my 3D printers software) it just feels so clunky. The customization; wow the customization it's endless. I love it! It is awesome.
https://redd.it/e5ate0
@r_linux
I have my machine dual-booted but I haven't gone back to the Windows installation. I don't want to. I will put up with any of the glitches and bugs with the Nvidia drivers and such. I haven't got much to say; I could go into a rant about how much I hate Windows and never realized it but, that would make this post be a novel and I think that it is very well covered on this sub. I will just say that every time that I have to use Windows (like at school or in a VM for my 3D printers software) it just feels so clunky. The customization; wow the customization it's endless. I love it! It is awesome.
https://redd.it/e5ate0
@r_linux
reddit
Going back to Windows is not an option! A month into my switch to...
I have my machine dual-booted but I haven't gone back to the Windows installation. I don't want to. I will put up with any of the glitches and...
Beta testers wanted for harmony - Voice chat using Opus over WebRTC and Go
I'm working on a Discord alternative called [harmony](https://git.sr.ht/~tslocum/harmony). The initial proof of concept works! I'm hoping to find a few testers to run the initial release on their server (and hopefully share it with a few friends) and provide feedback.
A server exposes a web interface utilizing WebSockets and WebRTC. A native client is planned for desktop and mobile.
Please reply or send a message if you're interested in running a server. I hope to have the first release ready within the next week.
If you have any issues or suggestions feel free to share them [here](https://todo.sr.ht/~tslocum/harmony).
https://redd.it/e59ts2
@r_linux
I'm working on a Discord alternative called [harmony](https://git.sr.ht/~tslocum/harmony). The initial proof of concept works! I'm hoping to find a few testers to run the initial release on their server (and hopefully share it with a few friends) and provide feedback.
A server exposes a web interface utilizing WebSockets and WebRTC. A native client is planned for desktop and mobile.
Please reply or send a message if you're interested in running a server. I hope to have the first release ready within the next week.
If you have any issues or suggestions feel free to share them [here](https://todo.sr.ht/~tslocum/harmony).
https://redd.it/e59ts2
@r_linux
Disney plus working
Just tried Disney plus on Firefox. Seems to be working. Anyone els have any luck?
https://redd.it/e5dm31
@r_linux
Just tried Disney plus on Firefox. Seems to be working. Anyone els have any luck?
https://redd.it/e5dm31
@r_linux
reddit
Disney plus working
Just tried Disney plus on Firefox. Seems to be working. Anyone els have any luck?
Desktop Linux on Android!
I've been using my note 9 for nearly a year now thanks to Linux on Dex but they've now cancelled it. I found a great alternative called andronix on the play store! I'm running Debian 10 arm64 now.
​
https://preview.redd.it/o9215n7cae241.png?width=1920&format=png&auto=webp&s=3b4bb17605c9cd1d0328e2998448e5b266799f6c
https://redd.it/e5f886
@r_linux
I've been using my note 9 for nearly a year now thanks to Linux on Dex but they've now cancelled it. I found a great alternative called andronix on the play store! I'm running Debian 10 arm64 now.
​
https://preview.redd.it/o9215n7cae241.png?width=1920&format=png&auto=webp&s=3b4bb17605c9cd1d0328e2998448e5b266799f6c
https://redd.it/e5f886
@r_linux