You are here |
techtldr.com | ||
| | | |
newcome.wordpress.com
|
|
| | | | I wanted to spin up a Linux development environment to hack on some code that needed epoll. I could have run everything in a Docker container, but I kinda wanted to be in that environment for total hackage. I thought maybe I'd just do it in a Virtualbox instance. Then I didn't want to install... | |
| | | |
www.mikekasberg.com
|
|
| | | | I recently had to reinstall Windows on one of my personal computers. Although I hardly ever use Windows anymore, I keep it around in case... | |
| | | |
justin.abrah.ms
|
|
| | | | ||
| | | |
blog.jak-linux.org
|
|
| | This is an edited copy of an email I sent to provide guidance to users of apt-key as to how to handle things in a post apt-key world. The manual page already provides all you need to know for replacing apt-key add usage: Note: Instead of using this command a keyring should be placed directly in the /etc/apt/trusted.gpg.d/ directory with a descriptive name and either "gpg" or "asc" as file extension |