xvideo, xhamters, pornhub ?
I am trying to bulk download tube porn since I wont have internet during my holidays.
I use youtube-dl to bulk download ( cache ) music and porn.
With porn the process is too slow. I need to fill 8 TB and its not happening fast enough :(
I need to individually download each video .. ughh.
torrenting is a lot slower, and the quality is not on par with stream sites.
Also I like my porn short with a lot of variety. Most normal torrent porn is too long for my taste.submitted by /u/PmMeUrMenopauseGurl
I am looking to switch over to Linux for the first time so I can have more security/privacy when going online to access my email, Amazon and browsing YouTube/Reddit. I am currently using Windows 7 desktop which I will keep for gaming purposes, but would like to get a laptop running Linux so I can do all my non-gaming activities in a more secure environment. Any suggestions for a reliable laptop that supports Linux? I have not decided which distro I will be using yet, however any advice that could help me make a informed decision would be greatly appreciated. I will not be using linux for gaming.
Thankssubmitted by /u/PCMR-NewUser-617
Just one day after announcing the release of the GParted 0.27.0 open-source partition editor software, Curtis Gedak is informing us about the availability of the GParted Live 0.27.0-1 stable release.
Today, October 23, 2016, the development team behind the Debian-based Netrunner GNU/Linux distribution proudly announced the release of Netrunner Core 16.09 "Avalon."
How does various linux variants maintain security in repositorys and download mirrors for everything like apt-get, yum, pacman or some software center or rpm install and what have you?
For example lets say some university is hosting a mirror for some apt-get software or ISO images. What prevents a person at that site from tinkering with the files?submitted by /u/mobani
Well, I was doing very well with a new Gentoo install from a few days ago. I was getting a lot of stuff working that has always given me trouble, before.
Then came the kernel update for the big, urgent security hole patch. I felt like I got it made and installed properly, but it will no longer boot. I will try to fix it, but I may have to reinstall from scratch. Gentoo is so complicated.submitted by /u/arch_maniac
For a while we heard of a Chinese distro called Deepin, maintained by the Wuhan Deepin Technology Co., Ltd and its beautiful DE. I have used it for almost a month in a Virtual Environment without finding any apparent problem.
Two days ago, however, after the discovery of Dirty COW and not finding a patch in the repo, I have opened an issue on bugzilla (https://bugzilla.deepin.io/show_bug.cgi?id=10457). After few answers from the mantainer I tried to patch the kernel manually and, with big surprise, according to sources available on https://github.com/linuxdeepin/deepin-kernel, I found that the kernel is still based on version 4.4-rc6 (discontinued before the start of 2016).
git clone https://github.com/linuxdeepin/deepin-kernel/ cd deepin-kenrel fakeroot make -f debian/rules orig mkdir -p ../orig wget -c https://www.kernel.org/pub/linux/kernel/v4.x/testing/linux-4.4-rc6.tar.xz -O ../orig/linux-4.4-rc6.tar.xz || (echo "removing ../orig/linux-4.4-rc6.tar.xz"; rm -fr ../orig/linux-4.4-rc6.tar.xz; exit 1) --2016-10-21 21:53:56-- https://www.kernel.org/pub/linux/kernel/v4.x/testing/linux-4.4-rc6.tar.xz Resolving www.kernel.org (www.kernel.org)... 18.104.22.168, 22.214.171.124, 126.96.36.199, ... Connecting to www.kernel.org (www.kernel.org)|188.8.131.52|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 87271788 (83M) [application/x-xz] Saving to: ‘linux-4.4-rc6.tar.xz’ ../orig/linux-4.4-rc6.tar.xz 100%[=======================================================================================>] 83,23M 1,13MB/s in 75s 2016-10-21 21:55:12 (1,11 MB/s) - "../orig/linux-4.4-rc6.tar.xz" saved [87271788/87271788]
I tried to search inside that repo for any possible security patch but I could not find anything relevant.
Currently the kernel is not having any security patch and it is still vulnerable to exploits with fixes released more than 5 months ago (CVE-2016-4557: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4557 - Local Privilege Escalation)uname -a 4.4.0-2-deepin-amd64 #1 SMP Deepin 4.4.6-4 (2016-07-01) x86_64 GNU/Linux
I have reported several times that the kernel is currently not updated and safe but I have received no official response (https://en.bbs.deepin.org/forum.php?mod=viewthread&tid=31654&extra=).
Be careful if you are an user of this distribution, try to patch the kernel manually or just change distribution for now.submitted by /u/Nhoya
I don't know how common this actually to happen normally, as I mostly have it happen when testing some Wayland desktop environments, but sometimes after the main PID exits, you get left with the TTY being unswitchable if you use the CTRL+ALT+F(n) keys, or if you somehow even try to use ssh to run chvt.
This is because the TTY is in a state where it is expecting a running process to control the TTY switch, which doesn't happen because the process is dead, because it quit. (at least that is how I understand it)
The goal is to get the TTY out of the state that the process has responsibility of TTY switching (VT_PROCESS), into the default where the kernel can switch the TTY (VT_AUTO). ...and out of the KD_GRAPHICS state into KD_TEXT for good measure. This is assuming you can SSH in.
You can use Python to send ioctl's to the TTY device to control what state it is in to get it out, you will have to SSH to login as a user that can sudo to root, ...or login as root depending on your distro. You can run the oneliner below, but I will break it down.
Broken down now:#Run Python as root, specifying python commands to run. sudo python -c "\ #Import needed things, array and the ioctl command from array import array; \ from fcntl import ioctl; \ #Declare an array, set the contents, one of the ioctls need an array passed to it it seems buf = array('h', ); \ #Set the value needed for the array to zero, this is the value that will be passed when setting the mode buf = 0; \ #Open a file descriptor to the active TTY device, in writable mode. fd = open('/dev/tty0', 'wb'); \ #Send the KDSETMODE ioctl (0x4B3A) to the TTY device, with parameter, 0x00 (KD_TEXT) #This will set the mode of the TTY to text mode ioctl(fd, 0x4B3A, 0); \ #Send the VT_SETMODE ioctl (0x5602), with the array containing the value 0x00 (VT_AUTO ) ioctl(fd, 0x05602, buf); \ #Close the file descritor fd.close" submitted by /u/n3rdopolis