• 8 Posts
  • 147 Comments
Joined 1 year ago
cake
Cake day: July 23rd, 2023

help-circle




  • Well I’m sure they have very good reason and I’m not questioning them. I’m just talking from a user’s standpoint (and I’m a very poor Windows users): whenever I try to port any of our tools to Windows, wham the damn antivirus kicks in and puts my stuff in quarantine. If I use an engineering application that talks to some device on an unusual port - and I’m talking outgoing traffic, not incoming, wham it’s blocked. And unblocking it requires making a formal request to IT, that whitelists the application, until WithSecure updates itself and forgets about it, and here we go again.

    It’s just a complete PITA. You constantly feel like you’re fighting an algorithm with stupidity built in just to get normal, honest-to-goodness work done.


  • Well I’m sure they have very good reason and I’m not questioning them. I’m just talking from a user’s standpoint (and I’m a very poor Windows users): whenever I try to port any of our tools to Windows, wham the damn antivirus kicks in and puts my stuff in quarantine. If I use an engineering application that talks to some device on an unusual port - and I’m talking outgoing traffic, not incoming, wham it’s blocked. And unblocking it requires making a formal request to IT, that whitelists the application, until WithSecure updates itself and forgets about it, and here we go again.

    It’s just a complete PITA. You constantly feel like you’re fighting an algorithm with stupidity built in just to get normal, honest-to-goodness work done.



  • It’s whatever works for you.

    Me, depending on the type of file, I either have a more or less full description (so I can find things with find and English words) and/or some sort of short coding system that makes sense for a given type of file. After using the same codes for a long time, I know exactly what they mean.

    For example, I would name an ebook “823-sf-rah-The_moon_is_a_harsh_mistress.epub”: that way I can look it up by DDC number (823), genre (SF), author if they’re well known (Robert A. Heinlein) and of course the title of the book, or any combination thereof. That’s my own system for ebooks.

    For music, I make one directory per album or record named artist-comma-name (e.g. “Al_Di_Meola,Orange_and_Blue”) and the individual tracks inside as e.g. “track01-Paradisio.mp3”, “track02-Chilean_Pipe_Song.mp3”… The reason I only do one directory deep per album instead of, say, author/album/tracks is because most MP3 players back in the days, and most music apps today, understand that way of organizing music. That’s my own system for music.

    Etc etc. Just make up your own system that works for you. Just stick to characters that are acceptable in all OSes’ filesystems so you can move your stuff around without problems, and avoid spaces so it’s not a pain to type.


  • mv?

    Honestly, just prefix or suffix the filename. I’ve been cataloging all my stuff like that for the past 30 years - including, for things like music, the track number, which the filesystem and every portable device under the sun will naturally sort and play in the correct order. Finding things can be done with regular filesystem tools like, well, find. And it will work exactly the same way in all OSes that have a concept of filesystem.


  • ExtremeDullard@lemmy.sdf.orgtoLinux@lemmy.mlFile tagging software?
    link
    fedilink
    arrow-up
    8
    arrow-down
    2
    ·
    edit-2
    9 days ago

    mv?

    Honestly, just prefix or suffix the filename. I’ve been cataloging all my stuff like that for the past 30 years - including, for things like music, the track number, which the filesystem and every portable device under the sun will naturally sort and play in the correct order. Finding things can be done with regular filesystem tools like, well, find. And it will work exactly the same way in all OSes that have a concept of filesystem.



  • 2FA is great. It’s the best tool there is against impersonation and account takeovers.

    But it’s only great PROVIDED

    1. It’s a real, proper second factor like a hardware token or - less great but okay - a “secure” cellphone app. When it’s a totally insecure factor like SMS, 1FA is preferable.
    2. It’s not such a PITA that you hate using it.
    3. When it’s a proprietary app from one of the big data sonsabitches, it’s also an app to spy on you and your activities.




  • Funny you should ask: I installed Debian 32-bit on an old Asus Eee PC netbook yesterday to breathe new life into that old machine and turn it into a controller for a piece of test equipment we have at work. My company keeps old stuff like that around until space is needed in case someone needs something.

    Just in case I had to modify something in the tester’s control software, I figured I’d install i3wm and Vim. It didn’t take long and I was surprised by how usable the machine ended up being. Honestly I wouldn’t have minded using it as a bone fide laptop for light-duty work on the go.

    So basically keep your expectations low and install super-lightweight software, and your old Aspire could live a few extra productive years instead of going to the landfill.




  • If there’s one thing I learned both as a kid and as a father, it’s that restricting kids’ access to computers - or anything really - just doesn’t work: software solutions that exist for that purpose are almost always defeated by kids, who are reliably more clever than the adults who try to restrict them, and only exist to falsely reassure their parents.

    If you’re serious about controlling your children’s cellphones, I’d suggest buying them Linux phones, or phones that you can install a mobile Linux distro on: nobody makes Linux apps, so good luck getting malware or shitty social media apps on them. And of course, you can keep the root password to yourself and set up your kids as non-privileged users.

    Either that or feature phones - if you truly hate your children.