What kinda issues are you having? Most of my problems with Nix are solved with overlays or creating a module. Admittedly, in order to do that you still have to know how to fix your issue the usual linux way. Afterall, Nix is more of an abstraction tool IMO; good for replicating something across a ton if devices. If you don’t need that, there’s other distros that work much better out of the box.
Another tip, please be very careful when exposing ports to the public. With docker you’re already mitigating your attack surfaces but an open port allows anyone to make a connection and there are lots of bots out there looking for open ports and vulnerabilities. A good alternative would be to setup wireguard and instead then connect through that or if you like simplicity check out Tailscale.
This is kinda how I’ve come to look at it. You cannot ask questions of fact to a machine that works in probabilities.
Naw not 20 years ago, that’s 2004. Here’s an article from the Army talking about their introduction in 09, most Army units wouldn’t have seen till 2010.
I was in the USMC so adding about 5 years till we got them tracks lol. I absolutely was taught in the school house with no confidence clip and I remember what country I was in when I got training on it in 14-15.
You wouldn’t have remembered if it was 20 years ago. That clip was introduced recently, I remember where I was the first time I saw one and that would’ve been like 2015.
Check out my other comment but I’m pretty sure it’s because of the confidence clip. There’s actually an extra step where you sweep your thumb across the spoon to allow the pin to be removed from the grenade. After that yeah you probably could pull it with your teeth… but if you fucked up and fumbled it you’d win the Darwin award.
Really the myth should be about cooking a grenade. Absolutely no way in fucking hell you’d ever trust that fuse to “actually” be 4 seconds. What if it’s short and actually 3? And you wait to 2 to throw? Nooo way lmao
They’re probably referring to the confidence clip. We used to tape the spoon to the grenade because if the pin got caught on your jacket, you’d have a really bad day. There’s actually an extra step before you pull the pin where you sweep your thumb across the spoon to allow the pin to be pulled out. If you just grabbed a grenade and tried to rip the pin out with your teeth, without removing the confidence clip, you’d rip your teeth out.
I just want to say, your work on that game absolutely would’ve contributed to making my high-school years better. Me and my social group played this game constantly, spent tons of hours playing SF Refinery 😂 From the bottom of my heart, thank you so much!!
I recall it being fully simulated. You had to walk into a class room and sit down and watch a like 45min (maybe? Idk this was over a decade ago) presentation on an overhead where an instructor went over a combat life saver course. You’d have a test to answer with multiple choice questions that you had to pass at the end lol
Nawww it was way harder than that!! If you wanted to play as the medic class in a game online you had to do the offline training. The training made you sit through like a 45 minute long combat life saver class. No shit had to like walk into the classroom and sit near the projector and look down to answer questions lol
If you wanted to do the Special Forces maps (basically night mode maps) you had to pass this skull dragging class where you had to avoid being spotted and slowly move into an area. I remember trying for like 3 days just to pass that friggin class!
:3
You like using window managers, don’t you?
Use nix repl! That stands for Read Eval Print Loop. You can evaluate a nix expression and see all the attributes inside. For example, on a non-flake system, use :l <nixpkgs/nixos>
inside the repl to load the current system. Then you can hit the tab key to show whats inside of the current attribute set, make sure you have a . at the end. Then you can press enter to evaluate and see the declaration. For example when you set networking.hostName in configuration.nix you can actually find it under options.networking.hostName.value evaluating that in the repl.
Imo the worst part of nix is how it turns into this chicken or the egg scenario. Let me explain, nix is very good at reproducing things. It ensures that all things are the same when installing a piece of software. Once someone writes a nix module, generally speaking, it “just works”. You can always take that nix file and get it to run the same way on another machine. But since most gamers/musicians don’t give two shits about reproducible software, it doesn’t get packaged. And with no packages they will never be interested to get into nix.
As I write this though I realize, many open source projects have struggled with getting contributions from the community. Personally, I just think nix solves the issue of “idk, it works on my machine” better than anything I’ve seen. Being able to reproduce software and stop dependency issues is a very valuble thing, just not for everyone.
Hey this is a great web server example! Instead of commenting it out to enable or disable you can actually turn it into a full module. Check out this example of a nix module. Basically, you can take your code you pasted and put it under the config set. Then create an option to enable that set of code. Now you can always have this nix file imported, but enable the option only when you need it with another declaration. Really, that’s how all the declarations work you’re just getting the nix files from github and nixpkgs.
Don’t, you can still install nix into Garuda. Works great as a separate package manager that won’t get in the way.
I think the problem is that most people dive right in and go to NixOS which has its quirks as a linux OS (see FHS). The Nix language is great at building and moving source code between computers, really any big collection of binaries. If you don’t do that, try just using the nix-shell command to instantly run a piece of software without installing it. You can write a shell.nix file to hop into and out of an environment with whatever software you need. Once you can write a couple .nix files then move onto NixOS; which after all is just a big collection of binaries.
Unencrypted HTTP can mean that anyone can see your traffic as it passes through their network. Your ISP will see that traffic. If you’re streaming pirated music and you’re in a country that cares about those things, might not go very well. From a security stand point though, you still wouldn’t want to trust the authentication on the open port. A vulnerability may exist that you don’t know about. It’s always better to keep them closed and add another layer or two between your home computer and the public.
Tailscale let’s you tunnel into your home network without opening any ports, and it encrypts the traffic. Much safer way of doing it.