Avatar

colournoun

colournoun@beehaw.org
Joined
0 posts • 84 comments
Direct message

Or maybe just a way of collapsing them, or did I miss that?

permalink
report
reply

“See you later” “Not if I see you first!”

permalink
report
reply

https://www.phoronix.com/news/Debian-GNU-Hurd-2023

In the Debian GNU/Hurd case it’s even less practical due to the many limitations of Hurd and its primitive hardware support.

Given the Hurd limitations, Debian GNU/Hurd is mostly practical in VMs.

Debian GNU/Hurd is currently available for i386 and can build around 65% of the Debian archive.

Since the prior Debian GNU/Hurd release, APIC, SMP, and 64-bit support has improved a lot but is still a work-in-progress.

Debian GNU/Hurd has improved a bit over the past decade since last time testing it but is still very much limited and niche compared to Debian GNU/Linux.

permalink
report
reply

Real programmers curl unverified shell scripts into bash.

permalink
report
reply

If you get the sha256 from the same place you got the main file, then anyone tampering with the main file could also recalculate the sha256 to match the tampered file. A signature signed with a certificate uses complex math (public-key asymmetric cryptography) to give some certainty that the signed content (the sha256) is the same sha256 that the original file author created. It’s not mathematically feasible to recalculate the certificate signature. Why don’t we just sign the whole original file with the public-key crypto and skip the sha256? Because asymmetric crypto is much, much slower than plain symmetric crypto or hash functions. It’s faster and easier to generate the valid hash or key, then sign or encrypt just the smaller key.

permalink
report
reply

In other words, if the sha matches, then it wasn’t corrupted during downloading. If the signature matches, then it wasn’t tampered with before you downloaded it.

There’s also a third check. Even if the certificate signature is valid, you have to have confidence that the certificate is authentic and trusted to be from the original author. This is usually done by having a trusted third party sign the certificate with another, more trusted, certificate.

permalink
report
parent
reply

Usually, the best way to control a feral colony is Trap-Neuter-Return (TNR).

https://www.alleycat.org/our-work/trap-neuter-return/

https://www.alleycat.org/resources/how-to-help-community-cats-a-step-by-step-guide-to-trap-neuter-return/

If you were to simply remove the cats, it just makes space for others to move in. Leaving a few in place but unable to reproduce helps to keep the population low.

Look in your area for local TNR groups or humane societies willing to help you. Don’t expect them to do all of the work, but sometimes they will be able to loan you humane traps or point you to low-cost spay/neuter services. They always get more requests than they have capacity to handle, so the more work you can take on yourself, the more likely they are to help you. Also, just to set expectations, it’s probably not something that can be solved in a weekend or even a month. Trapping often takes a lot of patience.

Unfortunately for the injured kitten, often the must humane thing to do is euthanasia. You can contact local vets and ask if they would look at the kitten for low cost or provide low cost euthanasia so that at least it doesn’t suffer. I know it sucks, but sometimes the best you can do is reduce suffering.

permalink
report
reply