Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.os.linux.mint    |    Looks pretty on the outside, thats it!    |    30,566 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 29,400 of 30,566    |
|    s|b to Paul    |
|    Re: Password incorrect after name change    |
|    25 Oct 25 17:22:40    |
      From: me@privacy.invalid              On Sat, 25 Oct 2025 09:42:25 -0400, Paul wrote:              > On Sat, 10/25/2025 8:06 AM, s|b wrote:       >       > > That's a bit overwhelming. If we would choose some obscure distribution,       > > let's say Tiny11, I would imagine there would be less support than for       > > instance Linux Mint. That's not good, is it?              > I guess I'm not doing a good job on the analogies.              Could be the language barrier. (-;              > As a helper, as an initial skill, you should read up       > on what the "standard procedure is".       >       > Let's use as an example, someone drops by your help center.       > They say       >       > "I have a new printer. How do you install those, anyway ?"              I'm interrupting, but (most) people will say "I have a new printer. Can       YOU install his?"              > And you, having read the official page for it, follow the       > procedure, make sure CUPS is installed, and then use some       > dialog pointed at port 631 and start the printer install.       >       > Now, maybe the printer is a tough one, and requires a       > few minutes search on Google to determine "status on       > July 2025 printer that just arrived". Or, it's an existing       > printer (like the one I bought, an end of line), and       > the driver is mature. The customer leaves happy.       >       > Six months pass. Something happens to the printer. You're       > not available. They go to the Linux Cafe for help. The helper       > there asks "how did he install it?". The customer replies       > "he used the standard procedure". The helper then has a context       > and the customer does their best to fill in the anecdotal bits.       >       > That's better than the customer saying, "Oh, s|b hacked it in       > with some custom assembler code, but I don't have the code       > he used." That's going to considerably complicate the situation.       > Who knows what the assembler code damaged while it worked?              This is why it's probably a good idea to cooperate with a Linux Repair       CafĂ©. I just want to add that our target group doesn't even have a       printer in most cases. The library (not our organisation) offers       printing documents as a service. (We would have to set up LibreOffice to       save documents that are compatible with Office365, but that is easily       done.)              > There is no end to the complexity a potential situation could raise.       > There would be questions here nobody could answer. They could       > likely answer them when sitting in front of the machine       > and looking around, as sometimes all it takes is one hint       > from a look around, to figure it out. The knowledge tree       > starts with a solid knowledge of the fundamentals underneath.       > It's the same way we learn maths.              That's why we have the KIS principle: Keep It Simple.              > Try using the OS with just sudo. The machines are most likely       > to be single user, there won't be situations where john peeps       > at mary's files using sudo.       >       > sudo can be restricted to only allowing "mount" and "umount"       > as privileged activities. That was more likely to be the       > intended usage of sudo in UNIX days. The UNIX box didn't come       > with sudo enabled. You installed it and edited the sudoers file       > with a "blessed" editor. And those are the privileges I       > was given back in the day, all I was allowed was "mount" and "umount".       > Sudo activites were logged, and sent to the administrator.       > (If you were abusing it, someone might notice.)              I made a note and will look into this. Or maybe you have a URL I can       take a look at?              > If you did become root, by adding the password, as root you       > could edit the sudoers file and restrict the activities of others.       >       > As long as the disk isn't encrypted, I'm willing to bet you can       > always exploit it. Using things like chroot, from a boot key.              We wouldn't encrypt the drive. The option comes up during installation,       but I already said to my supervisor that it wouldn't be a good idea for       the people we want to reach. Easier to retrieve data in case of a       problem was the main idea. Keep in mind everybody would still have an       external hdd with backup data of their Windows laptop/PC.              --       s|b              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca