|
You are here |
tilde.town | ||
| | | | |
justi.cz
|
|
| | | | | tl;dr I found a vulnerability in apt that allows a network man-in-the-middle (or a malicious package mirror) to execute arbitrary code as root on a machine i... | |
| | | | |
niemczuk.tech
|
|
| | | | | The thing with Debian stable is that it is stable. But you don't get the newest software which is sometimes required. Of course there are backports repositories but after a new Debian stable release may not include the required version. On the other hand adding sid repositories could mess up your system after an apt update. The solution for this is apt-pinning. | |
| | | | |
michael.stapelberg.ch
|
|
| | | | | Recently, a user reported that they don't see window titles in i3 when running i3 on a Raspberry Pi with Debian. I copied the latest Raspberry Pi Debian image onto an SD card, booted it, and was able to reproduce the issue. | |
| | | | |
blog.thalheim.io
|
|
| | | Lately, I hacked on some kernel modules to get more debug logs out of a kernel module on my NixOS machine. Because NixOS does not follow the Filesystem Hierarchy Standard (FHS) for filesystem layouts, the standard kernel hacker tutorials won't fully apply to NixOS. However, by leveraging the NixOS configuration, we can quickly set up an environment that allows us to compile the Linux kernel and its modules. Where can you define the kernel? | ||