kde transparency
iv tried the desktop effect called "translucency" but it only does so much. the "special application settings" seems perfect to set the transparency settings i want BUT only seems to effect one app. i really dont want to have to do them individually as this will take me hours just for the apps i have and then if i install new things later ill have to set it for them later. is there a way i can set this for all applications in one go and make it the default for everything so new apps will have it automatically set?
https://redd.it/bos6ge
@r_linux
iv tried the desktop effect called "translucency" but it only does so much. the "special application settings" seems perfect to set the transparency settings i want BUT only seems to effect one app. i really dont want to have to do them individually as this will take me hours just for the apps i have and then if i install new things later ill have to set it for them later. is there a way i can set this for all applications in one go and make it the default for everything so new apps will have it automatically set?
https://redd.it/bos6ge
@r_linux
reddit
r/linux - kde transparency
2 votes and 4 comments so far on Reddit
Visual Studio Code vs Jetbrains
I see a lot of folks are using VSC over other IDEs like Jetbrains, Eclipse, etc. I'm a python developer who switched to full Pycharm from VIM a couple years ago. I've tried VSC, but still can't get into it. For those who have worked with Pycharm, Jetbrains, etc, what made you choose one over the other?
https://redd.it/boszgo
@r_linux
I see a lot of folks are using VSC over other IDEs like Jetbrains, Eclipse, etc. I'm a python developer who switched to full Pycharm from VIM a couple years ago. I've tried VSC, but still can't get into it. For those who have worked with Pycharm, Jetbrains, etc, what made you choose one over the other?
https://redd.it/boszgo
@r_linux
reddit
r/linux - Visual Studio Code vs Jetbrains
1 vote and 7 comments so far on Reddit
Plasma shipping WireGuard GUI in upcoming 5.16 release
http://jgrulich.cz/2019/05/14/upcoming-news-in-plasma-5-16/
https://redd.it/bovely
@r_linux
http://jgrulich.cz/2019/05/14/upcoming-news-in-plasma-5-16/
https://redd.it/bovely
@r_linux
reddit
r/linux - Plasma shipping WireGuard GUI in upcoming 5.16 release
0 votes and 0 comments so far on Reddit
Linux Server benchmarking noscripts
https://haydenjames.io/linux-benchmark-noscripts-tools/
https://redd.it/bok9yb
@r_linux
https://haydenjames.io/linux-benchmark-noscripts-tools/
https://redd.it/bok9yb
@r_linux
Linux Blog
Linux benchmark noscripts and tools
Linux benchmark of CPU, storage, memory and network, This is a list of Linux benchmark noscripts and tools for quick Linux benchmark of servers and VPS.
KDE5 minimize to tray (solved with KDE4 ksystraycmd)
As you may know kde-4 had a very useful feature, you could minimize to tray almost any application.
It's useful for example for:
\- mailing clients (thunderbird, which doesn't have any extension for it now)
\- notes applications (treeline for example, I think no one uses it here, ha-ha)
\- any other types of application which you want to keep open permanently (spotify?)
​
But kde-5 removes this option, there was a checkbox in some early versions, but it didn't work cause ksystraycmd was removed from the bundle.
But today I found, ksystraycmd still works!
You just need to extract this single file from "kde-workspace-bin" package from kde-4.
​
So to run any application in "tray mode" you need just to modify shortcut, for example:
\- "/path/to/ksystraycmd --hidden /usr/bin/thunderbird %u" (for thunderbird).
\- "/path/to/ksystraycmd --hidden --window TreeLine treeline" (--window is for regexp which window should be used, treeline asks for password in a separated window)
​
A lot of help is available by "./ksystraycmd --help-all" from console.
I'm using debian buster for now so for debian this deb could be downloaded from [https://packages.debian.org/jessie/kde-workspace-bin](https://packages.debian.org/jessie/kde-workspace-bin)
Not sure about kubuntu users, I was unlucky to find it in ubuntu packages, it looks like the executable name is changed there, any help for this?
​
PS: Dear KDE developers, maybe this solution isn't good, but I have no other idea how to minimize my apps to tray and I needed it too much, alltray and kdocker works in general but much worse (artifacts, broken icons and so on), so I hope this way will work in KDE6 too :)
​
I've posted this to r/kde too, not sure is it allowed to duplicate, sorry if so.
https://redd.it/boiydv
@r_linux
As you may know kde-4 had a very useful feature, you could minimize to tray almost any application.
It's useful for example for:
\- mailing clients (thunderbird, which doesn't have any extension for it now)
\- notes applications (treeline for example, I think no one uses it here, ha-ha)
\- any other types of application which you want to keep open permanently (spotify?)
​
But kde-5 removes this option, there was a checkbox in some early versions, but it didn't work cause ksystraycmd was removed from the bundle.
But today I found, ksystraycmd still works!
You just need to extract this single file from "kde-workspace-bin" package from kde-4.
​
So to run any application in "tray mode" you need just to modify shortcut, for example:
\- "/path/to/ksystraycmd --hidden /usr/bin/thunderbird %u" (for thunderbird).
\- "/path/to/ksystraycmd --hidden --window TreeLine treeline" (--window is for regexp which window should be used, treeline asks for password in a separated window)
​
A lot of help is available by "./ksystraycmd --help-all" from console.
I'm using debian buster for now so for debian this deb could be downloaded from [https://packages.debian.org/jessie/kde-workspace-bin](https://packages.debian.org/jessie/kde-workspace-bin)
Not sure about kubuntu users, I was unlucky to find it in ubuntu packages, it looks like the executable name is changed there, any help for this?
​
PS: Dear KDE developers, maybe this solution isn't good, but I have no other idea how to minimize my apps to tray and I needed it too much, alltray and kdocker works in general but much worse (artifacts, broken icons and so on), so I hope this way will work in KDE6 too :)
​
I've posted this to r/kde too, not sure is it allowed to duplicate, sorry if so.
https://redd.it/boiydv
@r_linux
packages.debian.org
Debian -- Details of package kde-workspace-bin in jessie
core binaries for the KDE Plasma Workspace
Are any of these free (as in freedom; as in no Canonical): Manjaro, Zorin OS, POP! OS
I'm new to linux and am very worried about Canonical and the idea that some distros send your data to other companies.
I like these 3 distros and just wanted to be sure that they are not doing these things.
I know that Zorin and Pop are based on Ubuntu, and the original Ubuntu does have Canonical. But do these distros also have Canonical or anything similar?
https://redd.it/botq3c
@r_linux
I'm new to linux and am very worried about Canonical and the idea that some distros send your data to other companies.
I like these 3 distros and just wanted to be sure that they are not doing these things.
I know that Zorin and Pop are based on Ubuntu, and the original Ubuntu does have Canonical. But do these distros also have Canonical or anything similar?
https://redd.it/botq3c
@r_linux
reddit
r/linux - Are any of these free (as in freedom; as in no Canonical): Manjaro, Zorin OS, POP! OS
0 votes and 17 comments so far on Reddit
Multibooting repairing os
I'm creating a multibooting iso with multiple repairing os's does anyone have suggestions about which os's I should add
https://redd.it/boy2ux
@r_linux
I'm creating a multibooting iso with multiple repairing os's does anyone have suggestions about which os's I should add
https://redd.it/boy2ux
@r_linux
reddit
r/linux - Multibooting repairing os
0 votes and 1 comment so far on Reddit
Please test improved Plasma Theme switching for Plasma 5.16
https://www.reddit.com/r/kde/comments/boxl64/please_test_improved_plasma_theme_switching_for/
https://redd.it/boyriy
@r_linux
https://www.reddit.com/r/kde/comments/boxl64/please_test_improved_plasma_theme_switching_for/
https://redd.it/boyriy
@r_linux
reddit
r/kde - Please test improved Plasma Theme switching for Plasma 5.16
25 votes and 3 comments so far on Reddit
The performance benefits of Not protecting against Zombieload, Spectre, Meltdown.
With the news about MDS (Zombieload) I've seen a few paranoid posts and sensational headlines about intel CPU's with HT. [Looking at you Wired.](https://www.wired.com/story/intel-mds-attack-speculative-execution-buffer/)
​
From the reading I've done about these exploits they all share a few traits - they are all pretty difficult to pull off, they are all patched, and all of the patches reduce performance by some percentage.
​
For a critical system these things should of course be patched i.e., my ESXi server that runs my network with pfSense gets all security patches.
​
However, for a home user running linux as a desktop for work or play - I have a feeling that patching these things is pretty pointless in terms of security. Security is always a compromise with practicality, and most home users (even \[probably most\] advanced users) do use known insecure things (that Android phone) and mitigate (maybe) those known vulnerabilities with network segregation or something along those lines.
And lets be real, people do this for good reason - it's practical and you are almost certainly not a focused target. There are no governments trying to Stuxnet the WD Raptors in your home Plex server.
​
So my thought is, the fixes for these vulnerabilities might even be an actively bad idea for your average home user. Each one reduces performance by a little bit and protects you from an attack that isn't coming.
​
Not applying these updates is pretty easy - just don't update the BIOS, or modify the BIOS so that theese microcode updates aren't applied.
Then on the OS level you either disable or rollback your version of linux's microcode update package such as *intel-microcode*
​
The same process could re-enable TSX-NI on some CPU's - which doesn't work in some specific cases, but some users might have a use for it and be able to accept it's instabilities.
​
So my question is - how much performance could be re-gained by not protecting against these threats that almost certainly aren't worth thinking about to a home user?
https://redd.it/bozjem
@r_linux
With the news about MDS (Zombieload) I've seen a few paranoid posts and sensational headlines about intel CPU's with HT. [Looking at you Wired.](https://www.wired.com/story/intel-mds-attack-speculative-execution-buffer/)
​
From the reading I've done about these exploits they all share a few traits - they are all pretty difficult to pull off, they are all patched, and all of the patches reduce performance by some percentage.
​
For a critical system these things should of course be patched i.e., my ESXi server that runs my network with pfSense gets all security patches.
​
However, for a home user running linux as a desktop for work or play - I have a feeling that patching these things is pretty pointless in terms of security. Security is always a compromise with practicality, and most home users (even \[probably most\] advanced users) do use known insecure things (that Android phone) and mitigate (maybe) those known vulnerabilities with network segregation or something along those lines.
And lets be real, people do this for good reason - it's practical and you are almost certainly not a focused target. There are no governments trying to Stuxnet the WD Raptors in your home Plex server.
​
So my thought is, the fixes for these vulnerabilities might even be an actively bad idea for your average home user. Each one reduces performance by a little bit and protects you from an attack that isn't coming.
​
Not applying these updates is pretty easy - just don't update the BIOS, or modify the BIOS so that theese microcode updates aren't applied.
Then on the OS level you either disable or rollback your version of linux's microcode update package such as *intel-microcode*
​
The same process could re-enable TSX-NI on some CPU's - which doesn't work in some specific cases, but some users might have a use for it and be able to accept it's instabilities.
​
So my question is - how much performance could be re-gained by not protecting against these threats that almost certainly aren't worth thinking about to a home user?
https://redd.it/bozjem
@r_linux
WIRED
Meltdown Redux: Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs
Two different groups of researchers found another speculative execution attack that can steal all the data a CPU touches.
Linux 5.1, Red Hat's RHEL 8, Ubuntu Touch, GCC, App Store, Alpine, WSL2 | This Week in Linux 66 (Show Notes In Comments)
https://youtu.be/3QuNqbIcyEU
https://redd.it/bp15jt
@r_linux
https://youtu.be/3QuNqbIcyEU
https://redd.it/bp15jt
@r_linux
YouTube
Linux 5.1, Red Hat's RHEL 8, Ubuntu Touch, GCC, App Store, Alpine, WSL2 | This Week in Linux 66
https://tuxdigital.com/sponsus || https://tuxdigital.com/linuxiseverywhere On this episode of This Week in Linux, we've got a lot of big news to cover like t...
Invoke Sudo but specify user and password???
I'm working on pushing out a linux executable and have it run silently.
In terminal I just have to type sudo ./nameoffile and then enter the password.
Can I put all of this in one command?
Like $ su admin | sudo ./name of file | passwordforadmin
https://redd.it/bp2s90
@r_linux
I'm working on pushing out a linux executable and have it run silently.
In terminal I just have to type sudo ./nameoffile and then enter the password.
Can I put all of this in one command?
Like $ su admin | sudo ./name of file | passwordforadmin
https://redd.it/bp2s90
@r_linux
reddit
r/linux - Invoke Sudo but specify user and password???
0 votes and 2 comments so far on Reddit
PacketFence Network Access Control v9.0: new GUI, VPN support and Let's Encrypt integration
https://packetfence.org/news/2019/packetfence-v90-released.html
https://redd.it/bp34ex
@r_linux
https://packetfence.org/news/2019/packetfence-v90-released.html
https://redd.it/bp34ex
@r_linux
Which distro do you think is the Flagship of the various Desktop Environments and Window Managers?
We all know that some distro makers have developed their own desktop environment, like Mint making Cinnamon, Elementary with Pantheon or Solus making Budgie, so it's understandable that their distro is meant to be the flagship of that desktop.
But what about the others? A lot of people say that OpenSUSE is the one of KDE Plasma, but with the introduction of KDE Neon disrupts that idea, or despite being stated a spart of the GNU project, GNOME is pretty relevant on Fedora, being that Red Hat has a lot of influence on the project, and also on the [Getting GNOME page Fedora is on the top on the list](https://www.gnome.org/getting-gnome/), plus the fact that Fedora Workstation by default ships with a pretty much vanilla instance of it.
But what do you thing for the others? XFCE, Mate, i3, Openbox, etc.
https://redd.it/bp1wwm
@r_linux
We all know that some distro makers have developed their own desktop environment, like Mint making Cinnamon, Elementary with Pantheon or Solus making Budgie, so it's understandable that their distro is meant to be the flagship of that desktop.
But what about the others? A lot of people say that OpenSUSE is the one of KDE Plasma, but with the introduction of KDE Neon disrupts that idea, or despite being stated a spart of the GNU project, GNOME is pretty relevant on Fedora, being that Red Hat has a lot of influence on the project, and also on the [Getting GNOME page Fedora is on the top on the list](https://www.gnome.org/getting-gnome/), plus the fact that Fedora Workstation by default ships with a pretty much vanilla instance of it.
But what do you thing for the others? XFCE, Mate, i3, Openbox, etc.
https://redd.it/bp1wwm
@r_linux
reddit
r/linux - Which distro do you think is the Flagship of the various Desktop Environments and Window Managers?
2 votes and 18 comments so far on Reddit
Comprehensive Kernel 5.1.2 Tuning Analysis
## Intro
I was having difficulty finding information on the performance of the vanilla kernel vs the [`linux-zen`](https://www.archlinux.org/packages/extra/x86_64/linux-zen/) kernel, and how much CPU exploit mitigations (e.g. Spectre) affected performace. In particular I wanted information about general system performance and gaming performance in desktop computers. So I did some testing of my own and I wanted to share the results.
### TL;DR
There is a measurable benefit to both disabling CPU exploit mitigations and using the `linux-zen` kernel, but it's not worth disabling CPU exploit mitigations.
**Disabling** CPU exploit mitigations, compared to the vanilla kernel, using `linux-zen` nets around a +6% CPU/system performance improvement and less than +1% gaming performance (FPS) improvement.
**Without disabling** CPU exploit mitigations, compared to the vanilla kernel, using `linux-zen` nets a +1-2% CPU/system performance improvement and less than +1% gaming performance (FPS) improvement.
## Testing Methodology
I used the [Phoronix Test Suite](https://www.phoronix-test-suite.com/). The two tests I used were `system/gimp` and `pts/unigine-valley`. To disable exploit mitigations I used the Linux boot cmdline option `mitigations=off` which was added in [this commit](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v4.19.43&id=8cb932aca5d6728661a24eaecead9a34329903ff). To verify the state of CPU exploit mitigations, I used the latest version (as of today, May 15) of [spectre-meltdown-checker](https://github.com/speed47/spectre-meltdown-checker) from GitHub.
### Hardware and versions
I'm using an Intel 4960K overclocked to 4.4 GHz at 1.3 V with a Noctua NH-D15. I'm using the `cpuidle.governor=teo` Linux boot cmdline option, which was added in the new 5.1 kernel. The graphics card is (unfortunately) an MSI NVIDIA 980 Ti that is not manually overclocked, though its factory clock is 1139 MHz while the reference 980 Ti clock is 1000 MHz. Using [Green with Envy](https://gitlab.com/leinardi/gwe) as a flatpak and running a video game reports that the card runs at around 1300 MHz.
The `nvidia` driver version is 418.74. `mesa` is 19.0.4-1. The `intel-ucode` version is 20190514-1. Both kernels were released today May 15, version 5.1.2.
## Terminology
Vanilla Kernel: The default kernel that comes with Arch Linux.
`linux-zen`: The linux-zen kernel that is essentially the [Liquorix kernel](https://liquorix.net/) but without the MuQSS CPU scheduler.
mitigations on: The tests were ran without any kernel parameters modifying mitigations, after spectre-meltdown-checker verified all
mitigations were in place.
mitigations off: The tests were ran with mitigations off, after spectre-meltdown-checker verified most mitigations were NOT in place.
## Results
### system/gimp (lower is better, measured in seconds)
#### resize
Vanilla Kernel mitigations on: 10.44
Vanilla Kernel mitigations off: 10.21
`linux-zen` mitigations on: 10.39
`linux-zen` mitigations off: 10.16
#### rotate
Vanilla Kernel mitigations on: 11.88
Vanilla Kernel mitigations off: 11.45
`linux-zen` mitigations on: 11.66
`linux-zen` mitigations off: 11.26
#### auto-levels
Vanilla Kernel mitigations on: 12.70
Vanilla Kernel mitigations off: 12.27
`linux-zen` mitigations on: 12.51
`linux-zen` mitigations off: 12.10
#### unsharp-mask
Vanilla Kernel mitigations on: 14.47
Vanilla Kernel mitigations off: 13.82
`linux-zen` mitigations on: 14.21
`linux-zen` mitigations off: 13.63
### Unigine Heaven (higher is better, measured in FPS)
Vanilla Kernel mitigations on: 37.71
Vanilla Kernel mitigations off: 37.86
`linux-zen` mitigations on: 37.94
`linux-zen` mitigations off: 37.98
###### Edit: spacing and formatting
https://redd.it/bp5qnu
@r_linux
## Intro
I was having difficulty finding information on the performance of the vanilla kernel vs the [`linux-zen`](https://www.archlinux.org/packages/extra/x86_64/linux-zen/) kernel, and how much CPU exploit mitigations (e.g. Spectre) affected performace. In particular I wanted information about general system performance and gaming performance in desktop computers. So I did some testing of my own and I wanted to share the results.
### TL;DR
There is a measurable benefit to both disabling CPU exploit mitigations and using the `linux-zen` kernel, but it's not worth disabling CPU exploit mitigations.
**Disabling** CPU exploit mitigations, compared to the vanilla kernel, using `linux-zen` nets around a +6% CPU/system performance improvement and less than +1% gaming performance (FPS) improvement.
**Without disabling** CPU exploit mitigations, compared to the vanilla kernel, using `linux-zen` nets a +1-2% CPU/system performance improvement and less than +1% gaming performance (FPS) improvement.
## Testing Methodology
I used the [Phoronix Test Suite](https://www.phoronix-test-suite.com/). The two tests I used were `system/gimp` and `pts/unigine-valley`. To disable exploit mitigations I used the Linux boot cmdline option `mitigations=off` which was added in [this commit](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v4.19.43&id=8cb932aca5d6728661a24eaecead9a34329903ff). To verify the state of CPU exploit mitigations, I used the latest version (as of today, May 15) of [spectre-meltdown-checker](https://github.com/speed47/spectre-meltdown-checker) from GitHub.
### Hardware and versions
I'm using an Intel 4960K overclocked to 4.4 GHz at 1.3 V with a Noctua NH-D15. I'm using the `cpuidle.governor=teo` Linux boot cmdline option, which was added in the new 5.1 kernel. The graphics card is (unfortunately) an MSI NVIDIA 980 Ti that is not manually overclocked, though its factory clock is 1139 MHz while the reference 980 Ti clock is 1000 MHz. Using [Green with Envy](https://gitlab.com/leinardi/gwe) as a flatpak and running a video game reports that the card runs at around 1300 MHz.
The `nvidia` driver version is 418.74. `mesa` is 19.0.4-1. The `intel-ucode` version is 20190514-1. Both kernels were released today May 15, version 5.1.2.
## Terminology
Vanilla Kernel: The default kernel that comes with Arch Linux.
`linux-zen`: The linux-zen kernel that is essentially the [Liquorix kernel](https://liquorix.net/) but without the MuQSS CPU scheduler.
mitigations on: The tests were ran without any kernel parameters modifying mitigations, after spectre-meltdown-checker verified all
mitigations were in place.
mitigations off: The tests were ran with mitigations off, after spectre-meltdown-checker verified most mitigations were NOT in place.
## Results
### system/gimp (lower is better, measured in seconds)
#### resize
Vanilla Kernel mitigations on: 10.44
Vanilla Kernel mitigations off: 10.21
`linux-zen` mitigations on: 10.39
`linux-zen` mitigations off: 10.16
#### rotate
Vanilla Kernel mitigations on: 11.88
Vanilla Kernel mitigations off: 11.45
`linux-zen` mitigations on: 11.66
`linux-zen` mitigations off: 11.26
#### auto-levels
Vanilla Kernel mitigations on: 12.70
Vanilla Kernel mitigations off: 12.27
`linux-zen` mitigations on: 12.51
`linux-zen` mitigations off: 12.10
#### unsharp-mask
Vanilla Kernel mitigations on: 14.47
Vanilla Kernel mitigations off: 13.82
`linux-zen` mitigations on: 14.21
`linux-zen` mitigations off: 13.63
### Unigine Heaven (higher is better, measured in FPS)
Vanilla Kernel mitigations on: 37.71
Vanilla Kernel mitigations off: 37.86
`linux-zen` mitigations on: 37.94
`linux-zen` mitigations off: 37.98
###### Edit: spacing and formatting
https://redd.it/bp5qnu
@r_linux
Phoronix-Test-Suite
Phoronix Test Suite - Linux Testing & Benchmarking Platform, Automated Testing, Open-Source Benchmarking
The Phoronix Test Suite is the most comprehensive testing and benchmarking platform available that provides an extensible framework for which new tests can be easily added. The Phoronix Test Suite is focused on providing completely automated, reproducible…
Issues installing NVIDIA drivers
Hi all,
I am new to Linux and using Linux Mint currently. I am trying to install drivers for my NVIDIA MX150 gpu and when I run the command "sudo sh NVIDIA-Linux-x86\_64-430.14.run" it starts the install but then says
ERROR: You appear to be running an X server; please exit X before
installing. For further details, please see the section INSTALLING
THE NVIDIA DRIVER in the README available on the Linux driver
download page at [www.nvidia.com](https://www.nvidia.com).
I looked around a bit on how to exit the X server, but when I do it just logs me out of my computer and when I log back in and try running it I get the same issue. I am probably missing something stupidly simple but any help would be much appreciated!
How do I successfully install the driver?
https://redd.it/bp71o0
@r_linux
Hi all,
I am new to Linux and using Linux Mint currently. I am trying to install drivers for my NVIDIA MX150 gpu and when I run the command "sudo sh NVIDIA-Linux-x86\_64-430.14.run" it starts the install but then says
ERROR: You appear to be running an X server; please exit X before
installing. For further details, please see the section INSTALLING
THE NVIDIA DRIVER in the README available on the Linux driver
download page at [www.nvidia.com](https://www.nvidia.com).
I looked around a bit on how to exit the X server, but when I do it just logs me out of my computer and when I log back in and try running it I get the same issue. I am probably missing something stupidly simple but any help would be much appreciated!
How do I successfully install the driver?
https://redd.it/bp71o0
@r_linux
NVIDIA
World Leader in Artificial Intelligence Computing
NVIDIA invents the GPU, creates the largest gaming platform, powers the world’s fastest supercomputer, and drives advances in AI, HPC, gaming, creative design, autonomous vehicles, and robotics.