I’m glad I deleted that Windows partition since I didn’t use it anyways. And in typical Microsoft fashion they don’t acknowledge there’s even a problem leaving people in the dark. I’m never going back to Windows.
I’m glad I deleted that Windows partition since I didn’t use it anyways. And in typical Microsoft fashion they don’t acknowledge there’s even a problem leaving people in the dark. I’m never going back to Windows.
I have a couple of external USB drives I bought on sale I backup my NAS to once a week. It’ll protect against drive failure at least. Almost got hit by ransomware a while back so I don’t keep anything on there without some backup.
I’ve tried it. I like the idea of Tor for torrents, you don’t need a VPN to torrent. But found the speeds to be really bad and the content was a fraction of the clearnet trackers. Might check it out again though it’s been a while.
Yes me too. As bad as humanity seems sometimes, always good to remind yourself of the kindness from the likes of seeders in OP.
You need to bridge your network adapter so you are on the same network subnet. When you bridge the VM appears on the same network. The default is NAT which by default is a different subnet. Like you, the host are on 192.168.1.0/24 and the VM, the guest is on 192.168.122.0/24. Unless you have two network adapters(if so you could let the VM have it) unlike most people bridged is what you’re looking for. VPN tunnel is usually when you are remote of your VM so unnecessary IMO.
I think you’re missing the context. We’re not talking servers here but desktops. Arch is typically used on desktop systems. The threats that face desktops and servers are not the same. Same goes for risk and potential damage. Also please provide a source if you’re trying to debunk “common misconception”.
Your comparison was with random exes on the most targeted, malware infested operating system out there.
Many eyes are always better than no eyes. I’m not saying you shouldn’t vet the code stop misinterpreting but no one knows or catches everything by themselves. That’s why security needs transparency. If it’s as insecure as you’re saying we would have way bigger problems but we don’t. AUR is not as safe as the Arch repository sure, but definitely safer than installing random exes on Windows. It’s a flawed comparison you’re making.
If you’re paranoid you should be on an immutable distro cause xz backdoor was in some official repos. Repo maintainers do not catch everything either it was just a mere coincidence someone caught it(again thanks to transparency & many eyes on code) before mass deployment. Installing anything with root access is a risk. Going online is a risk. But there are ways to mitigate risk. Some security you’re always gonna have to trade for convenience.
They want you to buy their new games. They also want you to be more likely to buy the old games again when they eventually do a sloppy re-release of the old games or tie it to increase the value of their subscription offerings. Basically to make more money.
Thanks for reminding me. Yeah I need to backup my ROM library of old games. Got most of them from Vimm’s lair earlier this year. They had to take down a lot of the games shortly after cause threats of law suit from Nintendo, Sega among others. It’s just absurd many of the games on there are not even available legally anymore.
Well there is far less malware on Linux tbf so comparison is not completely accurate. But same caution applies, try to vet and understand what you install. That part is also easier with the AUR as it’s transparent in the packagebuild what it does unlike random exes with closed source. It’s also a large community with many eyes on the code so unless it’s a package with few users then it’s gonna get caught pretty quickly.
yup it’s solid. Find myself switching between Shortwave and Goodvibes, another solid radio app.