Nice trick !
notify-send --hint int:transient:1
De cette façon les notifs ne restent pas indéfiniment
En parlant de chiffrement, j'ai release ça il y a quelques temps.. C'est crade et vite fait mais ça a le mérite de faire les choses simplement.
Il a raison, le plus compliqué c'est de s'y tenir. Et pour le grand public ça ne marchera jamais car ils n'arriveront pas à conserver leurs clés privées sans la perdre ou sans la déposer sur des médias non sur.. Et là vient le bordel de la révocation.. #pessimiste
Et malheureusement cela reste beaucoup plus compliqué que d'ouvrir gmail
A quick note, there are actually 3 modes, not two when it comes to the drivers in use:
HVM: unmodified kernel and drivers using software emulated devices
PV-HVM: unmodified kernel with paravirtualized (Xen specific) disk and network drivers
PV: modified kernel and drivers
For a Xen guest/DomU you can do a very basic uname and lsmod with a grep to list the modules in use:
uname -a
lsmod | grep xen
If uname -a lists a kernel with the string "xen" in it, then you have a modified kernel and it's likely a PV guest, and you will see output from the lsmod command to confirm it. If you have output from the grep on lsmod but no sign of a modified kernel then you are PV-HVM. Without any sign of either, it's a straight HVM.
Note: Generally you can do more with VMs that have the PV tools installed, so that can be quite an obvious pointer, however you can fake the presence of the PV tools to allow suspend/resume etc. so you cannot rely on that in general.
Pour avoir plusieurs certificats
If a directory name is used instead of a PEM file, then all files found in
that directory will be loaded in alphabetic order unless their name ends with
'.issuer' or '.ocsp' (reserved extensions). This directive may be specified
multiple times in order to load certificates from multiple files or
directories. The certificates will be presented to clients who provide a valid
TLS Server Name Indication field matching one of their CN or alt subjects.
Wildcards are supported, where a wildcard character '' is used instead of the
first hostname component (eg: .example.org matches www.example.org but not
www.sub.example.org).
If no SNI is provided by the client or if the SSL library does not support
TLS extensions, or if the client provides an SNI hostname which does not
match any certificate, then the first loaded certificate will be presented.
This means that when loading certificates from a directory, it is highly
recommended to load the default one first as a file or to ensure that it will
always be the first one in the directory.
L'appel d'une fonction peut se faire avec ou sans parenthèse :
foo() ou foo
Ensuite, un Hash peut avoir plusieurs formes..
{'a' => 12}
où 'a' peut être n'importe quoi : string (comme ici), mais aussi objet,
symbol : exemple :
{:a => 12}
La nouvelle syntaxe, valable uniquement si les clés sont des symboles :
{a: 12, b: 'toto'}
Et enfin quand on call une méthode qui peut prendre un hash en argument (entre autre), pas besoin de mettre les { }
foo({a: 12, b:14})
ou
foo(a: 12, b:14)
ou
foo a: 12, b:14
Sympa ce workflow de protection de login
man apt_preferences
Alternative au apt-mark hold xx :
Package: <package_name>
Pin: origin ""
Pin-Priority: -1