-> @jrgd@lemmy.zip

  • 7 Posts
  • 144 Comments
Joined 2 years ago
cake
Cake day: January 5th, 2024

help-circle
  • Engie, Gunner, Scout (with single-target focused loadouts) do tend to perform best in dreadnought missions. Driller plays more of a support role, but can do decent chip damage and make pathways to ensure cover for teammates. There are also tactical support strategies such as fully freezing dreadnoughts while weak points are up and having a teammate do a massive burst of damage.

    You can build single-target damage builds as driller with overclocks and they will work decently well, with the caveat that the weapons used for the build will lose a lot of their normal utility.






  • Create a systemd user unit that waits for the network-online.target.

    A script something like:

    [Unit]
    Description=Startup script
    Requires=network-online.target
    After=network-online.target
    
    [Service]
    Type=oneshot # either simple or oneshot, but sounds like oneshot
    ExecStart=/home/<user>/script.sh
    RemainAfterExit=yes #if oneshot, otherwise no
    
    [install]
    WantedBy=default.target
    

    Edit the template according to your needs and dump it into ~/.local/share/systemd/user/<unit>.service and enable it with systemctl --user enable --now <unit>



  • For backing up files, you can plug in an external hard drive or ssd and clone your Users folder either directly from Windows, or open a Linux Live USB and clone the files 1:1. A simple copy in the file manager of either choice would work, but the command line tool rsync -avX <source> <destination> can be used instead to ensure as much of the file metadata is cloned as possible (accounting for differences in filesystems if you are transferring across from NTFS to Ext4 for example).

    In Linux Mint, there is a built-in backup utility which will let you create and restore backups from external media or cloud sources. Other backup tools like Timeshift, Snapper, BTRFS Assistant also exist, but may require additional configuration and/or specific configuration on OS installation if you intend to use some of these tools specifically.

    If you cannot use different applications for opening various file types and need a Windows-only software, the WINE translation layer does exist for general-purpose software, though it isn’t guaranteed to work with everything. Proton also exists for playing most Windows games on Steam.


  • I’m currently going through a similar situation at the moment (OPNSense firewall, Traefik reverse proxy). For my solution, I’m going to be trial running the Crowdsec bouncer as a Traefik middleware, but that shouldn’t discourage you from using Fail2Ban.

    Fail2Ban: you set policies (or use presets) to tempban IPs that match certain heuristic or basic checks.

    Crowdsec Bouncer: does fail2ban checks if allowed. Sends anonymous bad behavior reports to their servers and will also ban/captcha check IPs that are found in the aggregate list of current bad actors. Claims to be able to perform more advanced behavior checks and blacklists locally.

    If you can help it, I don’t necessarily recommend having OPNSense apply the firewall rules via API access from your server. It is technically a vulnerability vector unless you can only allow for creating a certain subset of deny rules. The solution you choose probably shouldn’t be allowed to create allow rules on WAN for instance. In most cases, let the reverse proxy perform the traffic filtering if possible.





  • For desktop/workstation users: the simple answer is just use the flatpak from Flathub or from some other source if you need a user package that doesn’t align to the ethos of your chosen distro. In most cases desktop Linux users have gone beyond self-packaging for specific library versions and just use a separate set of common libraries to power application needs beyond the out of box experience of any given distro. It’s part of why immutable distros are starting to take off and make more sense for desktop/workstation use-cases.

    For servers, it’s in the nature to become part of the technical debt you are expected to maintain, and isn’t unique among RHEL, OpenSUSE Leap, Debian, Ubuntu, or any other flavor of distro being utilized.



  • Ocis/OpenCloud can integrate with Collabora, OnlyOffice but don’t currently have things like CalDAV, CardDAV, E2EE, Forms, Kanban boards, or other extensible features installable as plugins in Nextcloud.

    If you desire a snappy and responsive cloud storage experience and don’t particularly need those things integrated into your cloud storage service, then Ocis or OpenCloud might be something to look into.


  • Given the Linux initramfs targets a block device as a file that then gets mounted as the persistent root filesystem, I don’t think it would really be possible to unmount / and replace the location with a file. Root isn’t represented as a file or directory in any filesystem structure and is a construct of many Unix and Unix-like kernels.



  • Under what means? The target is public sector and the OS to replace (Windows 10, Windows 11) would be a relatively compatible release target. Fedora is a competent leading edge (Wayland, Pipewire, BTRFS) distro that runs as a 6 month point release. I wouldn’t see many reasons to not go with Fedora Workstation as a base unless going for an immutable base or a different core distro (OpenSUSE or Debian mainly).

    EDIT: Missed that this is going to be immutabe, so it is likely being based on Fedora Kinoite, meaning there really aren’t many alternatives besides OpenSUSE’s offerings.


  • As I understand it, most of the Pebble’s OS is currently Open Source. Traditionally, you could download updates and applets, watch faces for your Pebble through it’s app, as well has have many phone integrations. Most of the phone integrations can now be done through GadgetBridge and applets downloaded from Rebble.

    Given the minimal need for always-online or really much of a internet connection at all beyond what is needed for third-party applets (weather watch faces, etc.), the older Pebble smart watches are able to be made about as private as one could reasonably expect from a Bluetooth wearable.

    The two upcoming remakes appear to be basing the mobile app and applet repo upon the Rebble community’s work, if not outright using it as the source. If the watches gain GadgetBridge support and/or the companion app is fully open source, I imagine these will be as worthy as the older watches.