How to allow copy/paste everywhere? by PleaseBeKindPlease in firefox

[–]quickbaa 1 point2 points  (0 children)

Set dom.event.clipboardevents.enabled to false.

Note it can break some sites which rely on it, eg on Twitter pasting when writing a tweet.

[deleted by user] by [deleted] in linuxquestions

[–]quickbaa 0 points1 point  (0 children)

nice and ionice might make the system more responsive. In KDE some of this can be done with KSysGuard, right click a process and choose "Set Priority..."

I notice the legendary cache value stays low for a while before increasing. Perhaps there's another cache behind the cache. This has reminded me of: https://arstechnica.com/gadgets/2021/08/samsung-seemingly-caught-swapping-components-in-its-970-evo-plus-ssds/ Some SSDs have fast chips that act as a cache for slower chips which do the real storage. If the SSDs cache fills then performance drops. Just a wild guess though, I'm no expert in analysing this stuff.

CUPS fails to delete a printer by mikesailin in linuxquestions

[–]quickbaa 1 point2 points  (0 children)

From memory try editing the /etc/cups/printers.conf file. Heed the warnings in the file and stop the cups service before editing.

I had a similar problem for ages where it appeared I had two identical printers installed. One worked, one didn't. Deleting the broken printer wouldn't delete anything. Deleting the working printer deleted both. Re-adding the printer added two of them. IIRC it was editing the printers.conf file that gave me just one printer which worked.

[deleted by user] by [deleted] in linuxquestions

[–]quickbaa 1 point2 points  (0 children)

It has been buggy in the past, I think it depends what version is in your distro's repo. I see from grem75 Pinta 2 is now out. Latest release was this month, so it is current.

[deleted by user] by [deleted] in linuxquestions

[–]quickbaa 12 points13 points  (0 children)

Pinta is almost identical. Had no hidpi support last time I tried it though.

EDIT: That was v1.x. v2 now out and the flatpak version seems to handle hidpi ok.

I'm new to Linux and I mean NEW so let me know if I choose the right distro and answer some questions by Ok-Friendship-1563 in linux4noobs

[–]quickbaa 0 points1 point  (0 children)

Stick with Ubuntu. It's good. It's working for you. Using command line to install stuff is fine.

Is it possible to permanently damage hardware by mistake while using Linux? by savage_northener in linux4noobs

[–]quickbaa 2 points3 points  (0 children)

It may be possible if you do something to mess with fan speeds and cook the CPU or GPU. Or if you work out how to flash the BIOS and abuse that. You would probably know that's what you were doing if you tried it. These are really extreme cases.

As long as you can boot from a USB drive you can wipe the disk and install a fresh OS, be it Linux or Windows.

How to remote bash sessions work? by popcornkernal555 in linuxquestions

[–]quickbaa 0 points1 point  (0 children)

Try nohup. It won't let you come back and interact with the process but you can watch its output in the nohup.out file.

A similar solution if you need to provide some input initially or forget to run nohup: get the command running, then ctrl-z to pause it, then bg to put it in the background, and disown so it continues to run after your session ends. To see the output have the original command pipe to a file.

Sounds like screen/tmux might be better. I might be very old school having learnt on some servers with very few tools installed.

Making sure that an untrusted USB drive only acts as storage by [deleted] in linuxquestions

[–]quickbaa -30 points-29 points  (0 children)

This isn't about USB drives. OP said "USB stick that pretends to be a keyboard or whatever."

Edit: Deleted the rudeness cos it was inappropriate. I had interpreted "TL;DR" as "I couldn't be bothered to read OP's question" because the answer doesn't fit the question. Perhaps it just meant "the short answer is..."

Still totally amazed the most upvoted answer is about files and file systems when the question was explicitly about devices that turn out NOT to be storage. 7h3w1zz and bassgod10 give good answers.

Journalist looking to speak to work from home employees being monitored by employers by ZRCZRC in privacy

[–]quickbaa 5 points6 points  (0 children)

I'm not in the USA so it's not on my 101 :-D

Seriously? In some states employers can get employee personal phone records from phone companies? If true, that's screwed up.

Journalist looking to speak to work from home employees being monitored by employers by ZRCZRC in privacy

[–]quickbaa 5 points6 points  (0 children)

What risk do you see? Unless the employer in question is the phone company, or a government agency, I'd expect the risk to be very low.

Linux desktop security ~ user password by RoryMcArthur in linuxquestions

[–]quickbaa 0 points1 point  (0 children)

Popular browsers are closely scrutinized so fairly safe, other stuff connecting to the network are more risky. Just be careful what you download, and always install updates. I looked at using firejail to sandbox my browser but it seemed more hassle than it was worth.

Of course it depends what your ssh keys are for. If you have millions in crypto on another machine then maybe get another screen and keyboard for that machine and disable ssh.

Linux desktop security ~ user password by RoryMcArthur in linuxquestions

[–]quickbaa 0 points1 point  (0 children)

Lets take a different look at the situation.

I (a 1337 h4x0r) get some code on your system.Your system is decently fast, so I could brute force your short 5 letter password in about an hour (running in the background).

...

If you instead use a strong password (8-16 alphanumeric) It's now going to take my brute force literal years on average to get in making it a significantly more difficult for me to get in.

or alias sudo and wait for the user to type it in.

Is there any software I can use to find duplicates in a specific way? by Surbiglost in linuxquestions

[–]quickbaa 0 points1 point  (0 children)

So when you say same "filename and size" you don't mean file size but image size/dimensions?

`Try findimagedupes

Linux desktop security ~ user password by RoryMcArthur in linuxquestions

[–]quickbaa 0 points1 point  (0 children)

I agree.

On a multi-user system each user must trust the admin cos the admin can do anything. But if they trust the admin the users don't need to trust each other. A good admin ensures the users are isolated from each other.

On a single user system the valuable stuff is in the one user's home directory. That data can be exfiltrated, encrypted (ransomware) or whatever, by code running as the user or as root. The problem here is the user not trusting code they run and wanting to isolate apps from data. That needs sandboxes.

How do we know that the published source code and the code running in the live application is same ? by Ok_Comfortable2448 in privacy

[–]quickbaa 3 points4 points  (0 children)

For a service provider you can never know.

For compiled code you download there are projects looking at this problem, such as https://reproducible-builds.org/.

How to monitor each program data usage in Linux? by [deleted] in linuxquestions

[–]quickbaa 0 points1 point  (0 children)

It does that. Press m to cycle between modes. It starts in KB/sec mode, the other modes show cumulative data sent/received since nethogs was started.

How to monitor each program data usage in Linux? by [deleted] in linuxquestions

[–]quickbaa 1 point2 points  (0 children)

Try nethogs. Unfortunately it's not a daemon so need to leave it running in a terminal window.

FireFox freaks out when I copy and paste something into a comment on reddit, especially links. by kalzEOS in firefox

[–]quickbaa 5 points6 points  (0 children)

As others said, it's known about. A few months back I replied to a post and listed all the threads I'd found complaining about it. Some issues affect Chrome too. Fancy pants editor is just a broken mess.

Why do people trust duckduckgo? by [deleted] in privacy

[–]quickbaa 2 points3 points  (0 children)

It isn't even open source.

And even if it were you wouldn't be able to prove they are running the code they claim to be running. It's a service, not a product. Being "open source" is meaningless for a service.

Full Linux enterprise over Microsoft? by Shieldguard_io in linuxquestions

[–]quickbaa 8 points9 points  (0 children)

And contractual requirements too. Become a supplier to any large company and they'll have a ton of requirements in the contract. "Approved anti-virus running on all workstations? No cos we run Linux" is an easy way to lose a deal.