2025-02-19

We trust you have received the usual lecture from the local System Administrator

A look at the iconic sudo warning message that emphasizes privacy, thoughtful actions, and responsibility when gaining elevated system privileges. The message's first two principles date back to 1993, while the Spider-Man-inspired third line was added by Red Hat in 2004.

Original archive.is archive.ph web.archive.org

Log in to get one-click access to archived versions of this article.

read comments on news aggregators:

Related articles

Tmux - the essentials

A practical guide explaining essential Tmux commands for managing terminal sessions, windows, and panes efficiently. The guide covers basic operations like creating sessions, detaching/reattaching, and managing window layouts, focusing on the most commonly used commands for daily productivity.

Tips to debug hanging Go programs

A comprehensive guide explores debugging techniques for hanging Go programs, covering stack trace analysis with SIGQUIT, interactive debugging using Delve, and core dump collection for later analysis.

DNS records for www.nih.gov

DNS records configuration details are displayed for www.nih.gov domain, showing the authoritative server's response and caching specifications. The lookup tool allows users to search DNS records for any domain or subdomain, providing comprehensive DNS configuration information.

Netboot Windows 11 with iSCSI and iPXE

An in-depth guide demonstrates how to netboot Windows 11 using iSCSI and iPXE, enabling Windows to run from a NAS instead of local storage. The solution allows gaming on Windows while maintaining Linux as the primary OS, providing a practical workaround for AAA games that restrict virtual machine usage.

cp - copying all files of a directory, including hidden ones

An exploration of how 'cp -R src/. dest' command works to copy directory contents, including hidden files, into a destination folder. The analysis delves into POSIX algorithm details, explaining why using src/. leads to copying contents rather than the directory itself.

Main Page

A wiki navigation page provides comprehensive resources for IRIX operating system, including setup guides, software versions, and development tools. Recent update confirms SSL implementation and site functionality improvements as of February 2024.

Y Combinator deletes posts after a startup's demo goes viral | TechCrunch

An AI-powered worker monitoring system by Y Combinator startup Optifye.ai sparked controversy after demonstrating real-time factory worker surveillance capabilities. The demo video showing performance tracking of 'Number 17' led to social media backlash, resulting in YC removing the content from their platforms. The incident highlights growing concerns about workplace AI surveillance despite continued VC investment in similar technologies.

Moving on from 18F. — ethanmarcotte.com

A former 18F designer shares their experience leaving the government agency amid concerning changes in leadership and organizational structure. The resignation was prompted by potentially problematic interviews conducted by unnamed officials, followed by mass layoffs of probationary employees. The narrative highlights the intersection of government work, labor rights, and the impact of politically-driven organizational changes.

IPv6 is hard

IPv6 implementation challenges often stem from incomplete network configurations and lack of proper monitoring rather than inherent complexity. Happy Eyeballs protocol allows browsers to automatically choose between IPv4 and IPv6, masking potential connectivity issues. Network administrators should either fully commit to proper IPv6 implementation or avoid partial deployments that can lead to connectivity problems.