Hacker Newsnew | past | comments | ask | show | jobs | submit | alt219's commentslogin

Why not just `scp ~/.tmux.conf remotehost:`?

I can't speak for the parent, but I rarely login to the same remote server twice and don't want to need to set things up and clean them up anytime I do. This is why I try to keep my stuff as close to vanilla as possible. If anything goes wrong on a server and someone sees I have a whole bunch of dot files to customize my config, it becomes a red herring that I have to spend time explaining away.

If only we had ways to automate repeating processes… oh well

No, wanting to keep things vanilla when you're dealing with lots of random servers is a valid concern. Just because you can solve this with shell scripting doesn't mean you should.

You could always copy the config to /tmp and use the -f flag.

Sometimes I ssh into a server as a specific user (e.g. as the "app" user that is used to run a web app), sometimes only root is available (probably not best practice, but it's not like I can or want to fix it myself).

In any case it's not practical to carry your dotfiles everywhere you go. Changes are also a hassle to propagate


Because I'm not the owner of the remote host.

1.1.1.1 has 4 1’s, as in 4/1, as in April 1 (or so I assume).


PuTTY is absolutely available for Linux. On Debian-based distros it’s just a `sudo apt install putty` away. But why?


One possibility is to run its terminal emulation somewhere else. But of course terminal emulators are a dime a dozen on Linux.


Two things come to mind: 1) if any arcing occurs, a metal enclosure will shunt to ground and (hopefully) trip a breaker; 2) in the event of an overload, plastic melts which might result in a fire.


Sadly, I have a family member who is susceptible to these types of scams. They’ve been duped too many times to count. They’re overly eager to believe they’re exceptional and that good fortune is due them. No amount of explaining has had any impact on their beliefs for the past fifteen years. It’s heart-wrenching.


I can almost understand the replies to this thread where the victim was never exposed to a scam before and didn't know what to look for. It still sounds wild but I guess people are sheltered. My kid was scammed out of some virtual pet in an online game at six years old and learned that whenever someone offers something to you, but requires you to give up something first, it's a scam.

But how does one get scammed over and over, having seen it before and knowing what the playbook looks like?


> whenever someone offers something to you, but requires you to give up something first, it's a scam.

Don’t you usually pay for things before you receive them when shopping legitimately?


Except for when the placement of the icon strip with the trashcan symbol changes to the bottom of the context menu because of the location of the context menu on the screen. Bonkers. No idea why the UI committee would’ve okayed that one.


Oh that's so weird :\


You're right. I just checked. That's odd.


> Imagine having to raise your arm to swipe, pinch and tap across an ultra-wide screen several times per minute. Touch works best on small surfaces, even if it looks impressive on a bigger screen.

I regularly find myself wishing pinch zoom were available on my large multi-monitor setup, even if i only used it occasionally, i.e. to augment interactions, not as a replacement for other input methods. As a (poor) substitute, I keep an Apple trackpad handy and switch from a mouse to trackpad to do zooming. Sadly I’ve found not all macOS apps respond to Magic Mouse zooming maneuvers.


According to the article, they were arms dealers.


Minor pedantic point—kelvin is the unit of measure of the Kelvin scale. There is no degree K, just K.


The protocol is called SpaceWire[0][1]. Not sure about the details of where sensors are located.

[0]: https://en.wikipedia.org/wiki/SpaceWire [1]: https://ntrs.nasa.gov/api/citations/20030025278/downloads/20...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: