Actually it’s just an archive. It can be easily extracted using dpkg -x *.deb ~/.local
for example.
Software developer interested into security and sustainability.
Actually it’s just an archive. It can be easily extracted using dpkg -x *.deb ~/.local
for example.
Fuck them, glad I switched to Jellyfin years ago.
Would you provide a free mail service?
The quieter you become, the more you are able to hear – Rumi
This + node_exporter.
Ah least they would need to know it first.
I think you may want to use
for device in /dev/disk/by-uuid/*
That doesn’t explain why you aren’t seeing messages. I see there is a shebang at the start of the script. Can you confirm that the script has the executable bit set for the root user?
It works with USB interfaces using passthrough. But yeah doesn’t make a lot of sense.
You wouldn’t download a car‽
I’m not buying anything, as I do not need anything.
Pepper itself is overrated. At least the black one.
From Archwiki > xrandr:
Tip: Both GDM and SDDM have startup scripts that are executed when X is initiated. For GDM, these are in /etc/gdm/, while for SDDM this is done at /usr/share/sddm/scripts/Xsetup. This method requires root access and mucking around in system configuration files, but will take effect earlier in the startup process than using xprofile.
Try disabling hardware acceleration
Mount the drive with the user or group as plex. See mount options uid and gid. You can also set precise permissions on the mount point (using options at mount time) to let plex access a subdirectory.
Files could be decrypted by the end user. The OS itself could remain unencrypted.
You could try organic maps.
We growing wiser, or are we just growing tall?
You’re right, apparently amongst other things there are some hooks that are ran during the package’s lifecycle in something that is called the control archive.