Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.os.linux.mint    |    Looks pretty on the outside, thats it!    |    30,672 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 29,402 of 30,672    |
|    Paul to All    |
|    Re: Password incorrect after name change    |
|    25 Oct 25 09:42:25    |
      From: nospam@needed.invalid              On Sat, 10/25/2025 8:06 AM, s|b wrote:              >       > That's a bit overwhelming. If we would choose some obscure distribution,       > let's say Tiny11, I would imagine there would be less support than for       > instance Linux Mint. That's not good, is it?       >              I guess I'm not doing a good job on the analogies.              As a helper, as an initial skill, you should read up       on what the "standard procedure is".              Let's use as an example, someone drops by your help center.       They say               "I have a new printer. How do you install those, anyway ?"              And you, having read the official page for it, follow the       procedure, make sure CUPS is installed, and then use some       dialog pointed at port 631 and start the printer install.              Now, maybe the printer is a tough one, and requires a       few minutes search on Google to determine "status on       July 2025 printer that just arrived". Or, it's an existing       printer (like the one I bought, an end of line), and       the driver is mature. The customer leaves happy.              Six months pass. Something happens to the printer. You're       not available. They go to the Linux Cafe for help. The helper       there asks "how did he install it?". The customer replies       "he used the standard procedure". The helper then has a context       and the customer does their best to fill in the anecdotal bits.              That's better than the customer saying, "Oh, s|b hacked it in       with some custom assembler code, but I don't have the code       he used." That's going to considerably complicate the situation.       Who knows what the assembler code damaged while it worked?              There is no end to the complexity a potential situation could raise.       There would be questions here nobody could answer. They could       likely answer them when sitting in front of the machine       and looking around, as sometimes all it takes is one hint       from a look around, to figure it out. The knowledge tree       starts with a solid knowledge of the fundamentals underneath.       It's the same way we learn maths.              Try using the OS with just sudo. The machines are most likely       to be single user, there won't be situations where john peeps       at mary's files using sudo.              sudo can be restricted to only allowing "mount" and "umount"       as privileged activities. That was more likely to be the       intended usage of sudo in UNIX days. The UNIX box didn't come       with sudo enabled. You installed it and edited the sudoers file       with a "blessed" editor. And those are the privileges I       was given back in the day, all I was allowed was "mount" and "umount".       Sudo activites were logged, and sent to the administrator.       (If you were abusing it, someone might notice.)              If you did become root, by adding the password, as root you       could edit the sudoers file and restrict the activities of others.              As long as the disk isn't encrypted, I'm willing to bet you can       always exploit it. Using things like chroot, from a boot key.               Paul              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca