You’re right, apparently amongst other things there are some hooks that are ran during the package’s lifecycle in something that is called the control archive.
Software developer interested into security and sustainability.
- 0 Posts
- 27 Comments
Actually it’s just an archive. It can be easily extracted using
dpkg -x *.deb ~/.local
for example.
ClemaX@lemm.eeto Selfhosted@lemmy.world•That's all folks, Plex is starting to charge for sharingEnglish34·5 months agoFuck them, glad I switched to Jellyfin years ago.
ClemaX@lemm.eeto Showerthoughts@lemmy.world•X88B88 is the word "voodoo" with a reflection.10·7 months agoE8XIB¹⁹
ClemaX@lemm.eeto No Stupid Questions@lemmy.world•Are there any programming languages with the same syntax as rust (or similar)?2·8 months agoRust is special regarding references but Kotlin reads similarly.
This + node_exporter.
I don’t think that browsers do that. There is HSTS but I think that it only checks if the connection is using TLS.
I think you may want to use
for device in /dev/disk/by-uuid/*
That doesn’t explain why you aren’t seeing messages. I see there is a shebang at the start of the script. Can you confirm that the script has the executable bit set for the root user?
It works with USB interfaces using passthrough. But yeah doesn’t make a lot of sense.
You wouldn’t download a car‽
From Archwiki > xrandr:
Tip: Both GDM and SDDM have startup scripts that are executed when X is initiated. For GDM, these are in /etc/gdm/, while for SDDM this is done at /usr/share/sddm/scripts/Xsetup. This method requires root access and mucking around in system configuration files, but will take effect earlier in the startup process than using xprofile.
Cirrus for weather, Currencies for, well, currency conversion, LavSeeker for searching public toilets.
All are available on F-Droid.
ClemaX@lemm.eeto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Can anyone help me with a problem with Photoshop on Linux (Lutris)English61·1 year agoTry disabling hardware acceleration
But the aerosols would also amplify the green house effect right?
Mount the drive with the user or group as plex. See mount options uid and gid. You can also set precise permissions on the mount point (using options at mount time) to let plex access a subdirectory.
Files could be decrypted by the end user. The OS itself could remain unencrypted.
Try this:
for file in ./* do echo "$file" done
To do some substitution operation om the filename you can use Bash Parameter Expansion.
https://garagehq.deuxfleurs.fr/