• 0 Posts
  • 35 Comments
Joined 1 year ago
cake
Cake day: August 24th, 2023

help-circle


  • For durability and smallest features, a metal unibody types that don’t have seams are great.

    For performance, I opt to have an nvme SATA enclosure that is USB 3.1 capable. Copying 15 GB in a minute or 2 is so satisfying. Plus my god being able to easily change the nvme SATA drive on the fly if needed and it being able to go up to a few TB without loss of performance is just to good

    For price, nothing beats free. Just don’t expect much more than what you get.











  • I was genuinely surprised when I saw Americans online arguing over the topic of free food in schools, i always hear the mantra “love thy neighbour” in media and such, but some are genuinely upset that someone less fortunate may get to eat at school.

    Is called hypocrisy, and it’s prevalent the more sociopathic a person is. Which is quite more common to see in the internet from the detachment/ lack of personal connection.




  • Yes, but I usually add my public key to the authorized_keys file and turn off password authentication once i do login with a password. On top of that, I have a sshpass one line command that takes care of this for me. It’s much easier than trying to manually type a password for the next time. I save it and just run it every time I think about using password login. Next time I need to ssh, I know the password login is not necessary.

    sshpass -p ‘PASSWORD’ ssh USER@IP.ADDRESS “echo ‘`cat ~/.ssh/id_rsa.pub`’ > ~/.ssh/authorized_keys && echo ‘Match User !root
    PasswordAuthentication no
    Match all’ > /etc/ssh/sshd_config’ && exit” && ssh USER@IP.ADDRESS

    At the next reboot, your system will now only accept key logins, except for root. I hope the root user password is secure. I don’t require it for root because if a hacker does gain shell access, a password(or priv esc exploit) is all they need to gain root shell. It is also a safety net in case you need to login and lost your private key.