General statistics
List of Youtube channels
Youtube commenter search
Distinguished comments
About
Gilad Barlev
Veronica Explains
comments
Comments by "Gilad Barlev" (@GSBarlev) on "Veronica Explains" channel.
Previous
1
Next
...
All
"Imagine if Microsoft shipped you a entire extra processor just to run Excel" reminds me that while you can now use Python (alongside VBA) in Excel, that code has to execute on Azure. 🤦♂️ Anyway, happy V-Day! V stands for Veronica in my book!
29
This is so cool. Even cooler that you did a full restore and not a restomod (aside from the SSD). Happy Marchintosh!
13
17:51 Just hearing that name sent an involuntary shiver up my spine. While the trauma of nvidia-xserver-settings and Xorg.conf editing are still fresh in my mind, the horror of NDISwrapper is something I'd completely repressed until just now.
7
@CubicleNate I love how we recognize the laptop by its eccentric resolution. Gotta say—took me a while to get used to the aspect ratio, but now that I'm acclimated, I'm kind of a fan.
4
I mean, I guess? It's basically, "Here, I'm going to hand you this lock so that the next time we meet, you'll know it's me, because I'm the only one who can unlock it."
4
Thanks for the tutorial! I'm embarrassed that I've been Team 🐧 for 17 years without learning this command. Aside: even with the obvious "I barely know 'er" bait, I'd argue that pronouncing it "fuse-er" is definitely preferable to the extremely rude sounding "eff user."
3
I've heard the argument that most people who want fractional scaling are best served upping the system font size. And I've definitely had that work well for me on single-display systems. It does fall apart when you have screens that have considerably different DPIs, though.
3
Don't forget Cute!
3
I love btop—it's gorgeous, and I find it conveys important information way better than htop or glances. Unfortunately, it requires a minimum width and height that are below what I get on my phone's ssh client, so it can never be my sole top.
3
Definitely seen this before on some OS (was it Windows?). It would bring up a list of processes that were locking the drive and give you the option to kill them.
2
Certainly getting (nerdy) kids used to the terminal and some bash-like shell is a good gateway to greater things.
2
She didn't even say "less secure" she said "often less secure," a qualification which, while probably more accurate, is not one I've ever heard across any of the cryptography guides I've read, which all uniformly advise avoiding RSA.
2
It's really great. Gorgeous, incredibly intuitive. Best time I've had tiling since Windows 3.1. That said, it's got a ton of "Alpha problems." For example: if I want screen capture (screenshots, OBS, whatever), I have to log in, log out, then log back in. And that's honestly the least of my issues atm. Even so, it's my daily driver, but I'd be lying if I said that the chaos wasn't part of the appeal. 🙃
2
Telling us that you used to be a music instructor is perhaps the least shocking revelation ever. Congratulations on taking this step! I'm so, so excited to see what the future holds for you!
2
I feel like Mr. Rogers would have daily driven Debian if he were a sysadmin. Maybe Mint. But yeah, I totally agree. The more I watch her content, the more I appreciate how much work Veronica does to maintain the sort of welcoming and accepting community you see far too infrequently in tech.
2
Updating SSH keys is a pain in the toucans, but totally agree that it's definitely good hygiene. As a slight aside, I recently wiped and reinstalled the OS on my Steam Deck, making sure to back up ~/.ssh to avoid having to update my keys. Except I forgot to back up my host keys in /etc/ssh, and so I had to go through the hassle of key-pruning across my ecosystem anyway. 😭
2
"Kdenlive: It's fine," is about the strongest endorsement I've heard for any video editor on Linux.
1
Interesting. I was just fooling around with Paramiko, which checks first for id_ed225519 before id_rsa
1
Regarding "burner" accounts: yeah, it's definitely less good for privacy than a pool of anonymous accounts, but it's better than nothing. It's pseudonymity vs. anonymity. A network admin's analog: the first is akin to routing the network traffic you want to sandbox through a VPN running off of a Linode server you're renting. The second is akin to using TOR. At best, you're creating a valuable profile of "V Google 💩" which can be marketed towards. At worst, a single link (i.e. location data) can be used to identify the burner as Veronica's Google 💩 and allow whoever to combine the data between the accounts.
1
Oh man this just reminded me of the first time I tried Debian and sudo apt install firefox gave me a big fat nothing. Took some web searching (on a non-Debian box) to find out that while firefox was FOSS, the name and logo were trademarked, meaning I had to install "Iceweasel" instead.
1
@kwinzman Did it say something about RSA being less vulnerable to quantum computing? If so, I think I read that. My knowledge of cryptographic ciphers is mostly academic and largely a decade stale, so I can't dismiss it off the bat. I'm still skeptical of the claim and whether it would be be meaningfully more secure for a actual quantum computer (that is, if if it could resist cracking by a 10,000-bit QC for 20 seconds instead of 10, then does that matter, especially if we could be a century off of a QC that powerful?)
1
Looks like clonezilla is already part of my SystemRescue ISO (which 💯 works with Ventoy), so I'll have to try it out as an alternative to GParted (which I think just wraps dd for this functionality) the next time I need to make or restore an image. Thanks for the lesson, Veronica!
1
According to the ICANN wiki, 3 May 2016.
1
5:37 Ooh! I have a suggestion! The GPD Win 4: - Is smaller than a netbook, being explicitly handheld, and is considered pocketable (though your pockets may vary) - Has a physical keyboard behind a Sidekick-style slide-out keyboard - Runs Linux smoothly (according to The Phawx) - Can be had with an LTE module - Runs a full fat AMD Zen3+ / RDNA2 APU - Is easy to take apart and repair - Costs maybe 1.5x the iPad
1
Ironically (and if memory serves) the very first smartphone jailbreak method was web-based, leveraging an exploit in Safari on iOS 1.0. I used it to install a third-party app store on my OG iPod Touch back before the first-party store even existed.
1
"Who would use a desktop OS that's two years old?" Me, uncomfortably side-eyeing my work laptop running a distro that's downstream of Ubuntu 22.04... At least @PaulDoodbro specified "desktop OS" because I think I'm running at least one server that's even older 🙃 P.S. It's Tangara Time
1
God, I would love to see what you'd do with a Steam Deck. That whole "wanting a familiar Linux, not just parts of one" resonates—yes, SteamOS is Arch; yes, Desktop Mode runs Plasma, but to install your favorite virtual terminal—let alone window manager—means breaking into the read-only filesystem or using overlays like Nix.
1
Does it really run a full VM and not a docker / distrobox container? That's ridiculous.
1
@pepeshopping Not of /etc. My backups only covered /home/deck.
1
@Raycursion Yes, that's correct. But I have a lot of machines on my network running OpenSSH that needed to be pruned. And given that they tend to have entries for each way the machine is identified (via IP vs via DNS), it was maybe five minutes each across a dozen machines, so an hour in sum.
1
Oh wow! I didn't know this existed! Thanks for the tip!
1
Previous
1
Next
...
All