Yes, I know. I meant i never switched since I started out with Linux…
- 0 Posts
- 13 Comments
Why would you assume I switched?
-edit- It appears my comment wasn’t clear… I never used anything else than Linux on my working systems…
rclone is supposed to be a good alternative… unless you’ve enabled Advanced Data Protection
bushvin@lemmy.worldto
Linux@lemmy.ml•[SOLVED] Recover deleted partition table - Guys, i need help!
2·10 months agoThis is why it’s important to make backups. If, by any chance you printed your disk configuration before the gpt operation, you want to copy it into a notepad NOW. You can use that to try and recreate your original partition layout after converting the disk back to MBR. Chances are nothing is wiped, except for your disk configuration. No guarantees, though…
Whatever you do, don’t format anything, as that WILL overwrite your data.
bushvin@lemmy.worldto
Linux@lemmy.ml•Why don't most distros support listing packages and system settings in text file(s)?
64·10 months agoYou need some ansible love in your life!
bushvin@lemmy.worldto
Selfhosted@lemmy.world•Ansible Playbook - How do I reverse engineer a running system?English
21·11 months agoI have my moments… 😉 Feel free to pm me if you need more advice.
bushvin@lemmy.worldto
Selfhosted@lemmy.world•Ansible Playbook - How do I reverse engineer a running system?English
191·11 months agoI would copy the existing system onto a new system:
- Update system to the latest packages
- Create a new base system using the same distro
- Check which packages are not on the new system, add them to your playbook
- Install packages on new system
- This will take some time. Run a find of all files and pass them to md5sum or sha512sum to get a list of files with their checksum. Compare the list from the old system to the new system.
- Update your playbook with these findings. Template is probably the way to go, Lineinfile might be good as well, use copy if nothimg else works.
- Check firewall settings and update your playbook.
Anyhow this will take some iterations, but while you have a copy of your ‘production’ system, you can test on your ‘test’ machine until you have the same functionality.
Boo fuckin’ hoo… Good riddance.
bushvin@lemmy.worldto
Linux@lemmy.ml•Please share your power optimizations to maximize battery life
34·2 years agoIse kde, not gnome.
bushvin@lemmy.worldto
Linux@lemmy.ml•Can you tell excel sheets which were created using a pirated version of MS Office?
18·2 years agoAside from the obvious (company providing all the necessary tools) why not using libreoffice and saving it as M$ excel?
bushvin@lemmy.worldto
Linux@lemmy.ml•First Look at Ubuntu’s New ‘Desktop Security Center’
2·2 years agoSurprise… Surprise… It’s a snap!
You may also want to check up on regulations and laws of your country.
In Belgium, for instance, I am responsible for any and all attacks originating from my PC. If you were hacked and said hackers used your computer to stage an attack, the burden of proof is upon you. So instead of hiring very expensive people to trace the real source of an attack originating from your own PC, enabling a firewall just makes sense, besides making it harder on hackers…

Correct!