qaz@lemmy.world to Linux@lemmy.mlEnglish · edit-21 year agoTIL You can use systemd-analyze plot > plot.svg to plot the service startup time to find bottleneckslemmy.worldimagemessage-square66fedilinkarrow-up1789arrow-down117file-text
arrow-up1772arrow-down1imageTIL You can use systemd-analyze plot > plot.svg to plot the service startup time to find bottleneckslemmy.worldqaz@lemmy.world to Linux@lemmy.mlEnglish · edit-21 year agomessage-square66fedilinkfile-text
minus-squareSkeletonek@lemmy.ziplinkfedilinkEnglisharrow-up8·1 year agoIt is, I have it set up on my laptop. It’s a bit finicky in how it works and it’s not easy to setup, but it is possible.
minus-squarestifle867@programming.devlinkfedilinkarrow-up3·1 year agoDoes it work by emulating the keyboard and typing in the password? Or by the encrypted protocol that works using the on device secret?
minus-squareSkeletonek@lemmy.ziplinkfedilinkEnglisharrow-up1·1 year agoBoth should be possible. I am using the psuedo 2FA method. First I type the PIN and after that I confirm with YubiKey.
It is, I have it set up on my laptop. It’s a bit finicky in how it works and it’s not easy to setup, but it is possible.
Does it work by emulating the keyboard and typing in the password? Or by the encrypted protocol that works using the on device secret?
Both should be possible. I am using the psuedo 2FA method. First I type the PIN and after that I confirm with YubiKey.