2025-02-19

We trust you have received the usual lecture from the local System Administrator

A look at the iconic sudo warning message that emphasizes privacy, thoughtful actions, and responsibility when gaining elevated system privileges. The message's first two principles date back to 1993, while the Spider-Man-inspired third line was added by Red Hat in 2004.

Original archive.is archive.ph web.archive.org

Log in to get one-click access to archived versions of this article.

read comments on news aggregators:

Related articles

Netboot Windows 11 with iSCSI and iPXE

An in-depth guide demonstrates how to netboot Windows 11 using iSCSI and iPXE, enabling Windows to run from a NAS instead of local storage. The solution allows gaming on Windows while maintaining Linux as the primary OS, providing a practical workaround for AAA games that restrict virtual machine usage.

cp - copying all files of a directory, including hidden ones

An exploration of how 'cp -R src/. dest' command works to copy directory contents, including hidden files, into a destination folder. The analysis delves into POSIX algorithm details, explaining why using src/. leads to copying contents rather than the directory itself.

Main Page

A wiki navigation page provides comprehensive resources for IRIX operating system, including setup guides, software versions, and development tools. Recent update confirms SSL implementation and site functionality improvements as of February 2024.

Y Combinator deletes posts after a startup's demo goes viral | TechCrunch

An AI-powered worker monitoring system by Y Combinator startup Optifye.ai sparked controversy after demonstrating real-time factory worker surveillance capabilities. The demo video showing performance tracking of 'Number 17' led to social media backlash, resulting in YC removing the content from their platforms. The incident highlights growing concerns about workplace AI surveillance despite continued VC investment in similar technologies.

Moving on from 18F. — ethanmarcotte.com

A former 18F designer shares their experience leaving the government agency amid concerning changes in leadership and organizational structure. The resignation was prompted by potentially problematic interviews conducted by unnamed officials, followed by mass layoffs of probationary employees. The narrative highlights the intersection of government work, labor rights, and the impact of politically-driven organizational changes.

IPv6 is hard

IPv6 implementation challenges often stem from incomplete network configurations and lack of proper monitoring rather than inherent complexity. Happy Eyeballs protocol allows browsers to automatically choose between IPv4 and IPv6, masking potential connectivity issues. Network administrators should either fully commit to proper IPv6 implementation or avoid partial deployments that can lead to connectivity problems.

JotaleaOS

JotaleaOS is an ultra-lightweight operating system that runs directly from a USB drive without installation, requiring only 2MB of RAM and a display of at least 640x480p. The system features basic command-line functionality with essential commands like echo, halt, clear, and help.

Rubenerd: Boring tech is mature, not old

Mature, predictable technology ('boring tech') offers significant advantages for system administrators by reducing unexpected behaviors and providing well-documented solutions to common problems. NetBSD exemplifies this concept by being mature and reliable, making it valuable for production environments despite not being the most widely adopted solution.

Three Years of Ephemeral NixOS: My Experience Resetting Root on Every Boot

An exploration of implementing ephemeral root filesystems in NixOS, where only allowlisted files persist across reboots, resulting in cleaner system states and easier maintenance. The approach offers benefits like fearless experimentation and simplified backups, but comes with challenges including installation complexity and potential performance issues.