It would have to iterate over all saved keys, which sounds rather inefficient to me and potentially unsafe (timing attacks etc.)
sshd only checks for matches in the user’s authorized_keys
file, not system wide.
It would have to iterate over all saved keys, which sounds rather inefficient to me and potentially unsafe (timing attacks etc.)
sshd only checks for matches in the user’s authorized_keys
file, not system wide.
I needed to find large directories on disk the other week, and found the tool btdu to be quite useful.
It could be a firmware update. I noticed on my machine that there was always one update in the discover program that appeared as ready but never got installed.
Turns out I had to manually run fwupdmgr update
to install it.
You are not in the sudoers file. This incident has been reported and your account suspended.
How about writing a script to automate the deletion, thus minimizing the chance of human error being a factor? It could include checks like “Is this a folder with .git contents? Am I being invoked from /home/username/my_dev_workspace?”
In a real aviation design scenario, they want to minimize the bullshit tasks that take up cognitive load on a pilot so they can focus on actually flying. Your ejector seat example would probably be replaced with an automatic ejection system that’s managed by the flight computer.