

I imagine you might be thinking of making the sign of the cross. Basicly people touch their heads, their chest of their heart, then the left and right shoulders. All with the tips of two fingers.
I imagine you might be thinking of making the sign of the cross. Basicly people touch their heads, their chest of their heart, then the left and right shoulders. All with the tips of two fingers.
As an ex catholic (now secular) you had me in the first half. I’ve never seen any chest beating though. That seems more of a Protestant thing to do.
TIL. Very cool.
+1 for Helix. Selection then action always made more sense to me than action then selection.
Ghidra seems intense when gdb is right there. Lol. What advantages do you see in using Ghidra on your own code? It seems interesting.
Solaris was beautiful. But it could have been more secure if it had Mandatory Access Controls. One compromised app running as root, or one privilege elevation exploit and without mandatory access controls you’re done.
Even with user contained exploits without MAC you expose way too much.
I like the fact that it is a solid mandatory access control system. With SELinux you are substantially more safe than without.
For example. Let’s say you are running a compromised version of OpenSSH. Threw a XZ style back door a hacker gets in as OpenSSH (which runs as root).
Without SELinux the system is fully owned. With SELinux the attacker can only access what OpenSSH needs to access even if they have root. They can’t just chmod files and folders wherever. That means your photos and application data are still secure. With the pre written SELinux policies this applies not just for OpenSSH but for every piece of software installed on your system. Everything is limited to the exact folders, ports, and system capabilities that it needs and no more. Even stuff like seperate websites being served under Nginx. You can have Nginx-subgroup-1 and Nginx-subgroup-2 where the applications can’t see each other even though they are being run as the Nginx user.
I don’t trust any Linux distro without this security layer.
It’s a little difficult to learn and master, but it’s totally worth it if you care about security.
Redhat put out a comic about it a few years ago explaining the basics. https://people.redhat.com/duffy/selinux/selinux-coloring-book_A4-Stapled.pdf
Thank goodness for selinux. Without it Linux would not be a secure OS.
And no AppArmor does not do the same thing. You need the mandatory part for mandatory access controls to work.
I think you are underestimating yourself. When I run games I make sure all new players create characters by hand. That way they have a sense of the fundamentals. By level 3 they’re able to do it all on their own and can crate new characters from scratch.
It’s a good thing to have a fundamental understanding of the game. After players get more experienced I let them use a character generator. Still have to print it out and use paper sheets though. Laptops and cell phones in my experience RUIN campaigns.
EDIT: My group uses Pathfinder 2e. It’s much more player friendly and feels less like they’re trying to suck every cent out of your wallet.
I think it’s a worth while effort. I know they burnt a lot of good will in the past but they are a major contributor to the Linux mobile effort. We shouldn’t rely on IBM for everything.
Nice. Does it work well for you? How does it compare?