ibraries and configuration,
>these systems effectively ship a developer's laptop to the
>cloud.
Dan, may I quote your preceding paragraph, naming you, on various
places I post?
Thanks,
SteveT
Steve Litt
http://444domains.com
___
Discu
Kent Borg said on Mon, 17 Jun 2024 09:45:26 -0700
>On 6/16/24 20:04, Steve Litt wrote:
>> Also, just for fun, reseat all your
>> daughtercards and ramsticks and cables, internal and external.
>> Elapsed time: Maybe an hour.
>
>An hour? No way. This is the s
ut going Slackware
or BSD.
I HATE intermittents!
SteveT
Steve Litt
Autumn 2023 featured book: Rapid Learning for the 21st Century
http://www.troubleshooters.com/rl21
___
Discuss mailing list
Discuss@driftwood.blu.org
https://driftwood.blu.org/mailman/listinfo/discuss
Rich Pieri said on Mon, 3 Jun 2024 17:46:23 -0400
>On Mon, 3 Jun 2024 15:58:57 -0400
>Steve Litt wrote:
>
>>> >Numbers of lines of code does not correlate with attack surface.
>>> >
>> That's exactly what I said, except I used the word correlate.
sure there are other exploits out there
related to systemd.
Meanwhile, the runit init system is less than 16K lines of code:
[slitt@mydesk runit-2.1.2]$ (find . | xargs wc -l | grep total) 2>/dev/null
15684 total
Systemd has about 80 times more lines of code than runit. I know this
d
Rich Pieri said on Wed, 22 May 2024 16:01:33 -0400
>On Wed, 22 May 2024 15:07:27 -0400
>Steve Litt wrote:
>
>> Unless you're encrypting the root partition, I can't think of any use
>> of LVM that can't be done other ways. I view LVM as yet another layer
>