Fediverse is still an unknown for a lot of people. It is also unregulated
by no central entity and everyone can impose their own rules. Critics say
that such environment attracts actors that are thrown out of other
communities and that these actors are actually bad actors.
Why wo…
Most servers I connect to have the option PasswordAuthentication set to
no, meaning I do more often than not see an error:
Permission denied (publickey).
The reasons for this are multiple, but in my scenario, this happens because
there are no identities (keys) present in the SSH…
Performing my mundane periodic software package upgrade on a laptop I did
not expect anything spectacular to happen. The
Informant did not stopped the upgrade
due to some breaking news. There was no problem with mirrors, key
signatures, cyclic dependencies or incompatible package…
There is a feature in Gitea that got me a little puzzled recently.
At first, I thought it is related to Project Milestones (a Kanban Board in
Gitea). After clicking around at everything I have found, and even removing
all the boards and milestones, the icon with a progress bar p…
By corrupting a bootloader on my router's motherboard I managed to
soft-brick it. Bootloader is usually the first batch of software
instructions, the motherboard executes when powered up. Soft-bricking means
that the device won't boot up, but can be resurrected to life, or
de-bri…
Part of the Arch Linux system maintenance is to actively read
latest news. Mostly anyone who uses Arch has
come across this piece of advice: read the news before updating! In other
words, before running the dreaded sudo pacman -Syu command, one should be
prepared to act upon any …
The
OpenWRT page
about download integrity verification describes three steps for a
successful verification of downloaded files:
Download the sha256sum and sha256sum.asc files
Check the signature with
gpg --with-fingerprint --verify sha256sum.asc sha256sum, ensure that
the GnuPG …