Thanks. I’ve had a couple of comments suggesting that it might be a memory leak instead of CPU usage anyway so I’ve installed earlyoom and we’ll see if that can diagnose the problem, if not I’ll look into CPU solutions.
Thanks. I’ve had a couple of comments suggesting that it might be a memory leak instead of CPU usage anyway so I’ve installed earlyoom and we’ll see if that can diagnose the problem, if not I’ll look into CPU solutions.
Open a console with top/htop and check if it will be visible when the system halts.
That would require me to have a second machine up all the time sshed in with htop open, no? Sometimes this happens on the server while I’m asleep and I don’t really want a second machine running 24/7.
Afraid I’m using OpenRC.


Wow, that surprises me. I did LFS with Sys-V (didn’t continue to use it after I set up X11 as I couldn’t be bothered with package maintenance/mostly did it as an exercise rather than for the sake of the finished system) and found it a fun project.
I wonder how many LFS users use GNOME or something that depends on systemd…
It might not be autism, it might be just lacking context as to what they mean. The kid is likely very young so they might not know what alphabetical order means. It’s a reasonable guess given the lack of explanation in the worksheet.


I don’t think the book and program examples are equivalent. You can edit a manuscript easily but it’d be a big headache to edit a binary program either through a hex editor or decompiling it and figuring out what it all does. I think an equivalent would be receiving the finished source code, as though someone else coded it for you.
Anyway, if it’s a personal project I want to do for the sake of it, then no, I like the process and the amount of control. If it’s something I’m only doing because I want the end product then maybe, but would have to decide on a case by case basis.
I don’t think any of those types of guns count as “non-violent”. None of the movements that have been the most effective have been strictly non-violent. You don’t have to be killing people at every action you do, but all the most effective movements have been willing to strategically use violence whenever the situation calls for it. Every strictly non-violent movement I’ve seen has simply been shooting themselves in the foot. When you’re shot at, shoot back, or you’re a coward obsessed with losing.
Shooting cops with guns.
The terminal lets you delete the system with the same checks as GUIs, i.e. you’d be prompted for a privilege escalation password… If you delete random user files in the terminal then you can do that in a graphical file browser too. Just don’t run random commands without knowing what they do.
I really do think that’s their problem, and software shouldn’t cater to people who are afraid of checks notes typing. There can be real accessibility reasons why some users may require graphical tools due to various disabilities, but I don’t think it’s reasonable to feed into irrational fears of terminals when they can just copy paste in commands. It’s not programming, it’s very simple to understand the syntax of any command the average user might have to use (ie they’re not doing scripting or anything like that).


Auto upload to a remote location (e.g. VPS), ideally somewhere out of the country to really minimise chances of deletion. Could also have it auto upload to several places. You’ll need good enough internet connection to upload it though, so if they’re using signal jammers at a protest that could be a problem.
In terms of preventing deletion on the phone itself, you can’t really stop them from “losing” your phone, even if they can’t get into it.
For Android? K-Mail. I think they renamed it to Thunderbird now.


Daddy’s money (USA)


“yall keep promising me the roman empire is gonna collapse but it never does”
No state lasts forever, least of all an apartheid state with such a resilient resistance movement against it. Israel’s only 78 years old—there’s plenty of living people older than that. It will fall, because Palestinians aren’t going away, and they will continue to want to return.


I didn’t say it categorically wouldn’t happen, just that if that was the person’s real intentions then they’ve been very stupid about it. If you’re going to commit a murder don’t create evidence pointing to you. Like the other commenter said, a gun and self defence skills will cover you in both cases.


I’m a she. But yes, I think arming yourself is a good idea regardless of the likelihood you’ll need it.


Get a gun and learn how to use it.
But as other commenters have said, if he was actually intending on killing you, it’d be real stupid to call you in advance to say so. Most likely just wants to scare you.


If you can’t feasibly vet the code yourself (I think it is feasible for things like scripts and other small projects) and the star count is low/it’s not already well known and trusted, probably try running in a VM first and look out for signs of it doing things it shouldn’t, e.g. if it’s sending HTTP requests to the internet despite it being a program that should be completely offline. Using things like AppArmor and SELinux to prevent programs from doing things they shouldn’t need to do is also good practice.
Also, the tool itself may be low star count, but is the developer known at all? Someone with any kind of a reputation wouldn’t risk putting malware on their profile.
I suppose you could also look at the list of dependencies of the program. Is it using any libraries that don’t make sense? e.g. with the above, is there some kind of HTTP request library being used for a program that shouldn’t need to access the internet at all?
I think generally the risk is quite low as the author would be hiding their malware in plain sight if the source code is available. They’d have to bet on literally nobody checking. Which is fine for very obscure projects, but if you want your malware to spread, you want a good number of people to use it, at which point someone would presumably look at the code and notice it’s malware.


I use SpamAssassin. It’s fine, but definitely needs training. I might look into migrating to rspamd as it seems better, but I don’t have time atm.
The point is that a daemon can catch it before it reaches that point by killing processes that are using too much resources, before all the system resources are used up.