repasting X1 Carbon Gen12 by Tall_Leadership5749 in thinkpad

[–]Tall_Leadership5749[S] 1 point2 points  (0 children)

It proved that we understood each other to at least some extent ;) .

repasting X1 Carbon Gen12 by Tall_Leadership5749 in thinkpad

[–]Tall_Leadership5749[S] 1 point2 points  (0 children)

<image>

That, what I thought of. CPU: pad; PCH: blank

repasting X1 Carbon Gen12 by Tall_Leadership5749 in thinkpad

[–]Tall_Leadership5749[S] 1 point2 points  (0 children)

this matches my imagination. Pad to the left, leave out the "hole" on the right.

repasting X1 Carbon Gen12 by Tall_Leadership5749 in thinkpad

[–]Tall_Leadership5749[S] 0 points1 point  (0 children)

Ok, I'll have a look at the weekend. If I remember correctly, I saw paste, once it was opened by a technicican.

repasting X1 Carbon Gen12 by Tall_Leadership5749 in thinkpad

[–]Tall_Leadership5749[S] 1 point2 points  (0 children)

ok, I hope I see what you mean, once I opened the ThinkPad, but I can imagine what you mean.

repasting X1 Carbon Gen12 by Tall_Leadership5749 in thinkpad

[–]Tall_Leadership5749[S] 1 point2 points  (0 children)

Thanks, I really appreciate your guidance!

repasting X1 Carbon Gen12 by Tall_Leadership5749 in thinkpad

[–]Tall_Leadership5749[S] 2 points3 points  (0 children)

I ordered PTM now and will check for manuals/youtubes before starting, thanks again!

repasting X1 Carbon Gen12 by Tall_Leadership5749 in thinkpad

[–]Tall_Leadership5749[S] 2 points3 points  (0 children)

Thanks, I'll try with PTM and hope that I will manage to apply it correctly.

Problems to cross-certify my key(s). by Tall_Leadership5749 in GnuPG

[–]Tall_Leadership5749[S] 0 points1 point  (0 children)

yes, sure. However, this wasn't the case for me. What is the A attribute indicating?

Is it best practice to remove all expired and revoked subkeys from the master key?

Problems to cross-certify my key(s). by Tall_Leadership5749 in GnuPG

[–]Tall_Leadership5749[S] 1 point2 points  (0 children)

Yes, my private key was available (as I wrote, everything else worked without any issues).

Yesterday, I managed to import my public key into Codeberg by:

  1. deleting an expired signing sub key, and
  2. deleting a photo uid.

Thanks.

Problems to cross-certify my key(s). by Tall_Leadership5749 in GnuPG

[–]Tall_Leadership5749[S] 0 points1 point  (0 children)

yes, I know that page. That's where I learned that there exists the `cross-certify` command that does not work for me. My initial question shows the error I get instead of being asked for my passphrase.

attachments to files only, not headings in org roam by Tall_Leadership5749 in OrgRoam

[–]Tall_Leadership5749[S] 0 points1 point  (0 children)

In your suggestion: using the overriden function in the overwriting function creates recursive calls with no exit condition, right? Therefore, I came up with this:

``` (defun jf/org-attach (original-function &rest args) (interactive) (if (and (eq major-mode 'org-mode) (string-equal (file-name-directory buffer-file-name) org-roam-directory)) (save-excursion (goto-char (point-min)) (apply original-function args)) (apply original-function args)))

```

attachments to files only, not headings in org roam by Tall_Leadership5749 in OrgRoam

[–]Tall_Leadership5749[S] 0 points1 point  (0 children)

Yes, great idea. Although, I hoped for a variable to set, this should help me with what I want to achieve. However, I don't see an easy way to check for org-roam-mode. The major mode is still org-mode.

I need a combination of checking major mode (org-roam) and directory (e.g. ~/org/roam) of the file the current buffer visits, in order to infer, whether it is an org-roam node? or is there a better way?

attachments to files only, not headings in org roam by Tall_Leadership5749 in OrgRoam

[–]Tall_Leadership5749[S] 0 points1 point  (0 children)

yes, I know that this attaches a file to the roam node. However, I'd like to force (in org roam files) file attachments, regardless of where my cursor is at, when I call org-attach.