mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.6K
active users

#filesystem

0 posts0 participants0 posts today
ax6761<p>... <a href="https://freeradical.zone/tags/BetrFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BetrFS</span></a> <a href="https://www.betrfs.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">betrfs.org/</span><span class="invisible"></span></a> ...</p><p>『… in-kernel file system that uses Bε trees to organize on-disk storage. Bε trees are a write-optimized dictionary, and offer the same asymptotic behavior for sequential I/O and point queries as a B-tree. The advantage of a B ε tree is that it can also ingest small, random writes 1-2 orders of magnitude faster than B-trees and other standard on-disk data structures.』</p><p><a href="https://freeradical.zone/tags/fileSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fileSystem</span></a></p>
ax6761btrfs mention
ax6761<p><a href="https://freeradical.zone/tags/ZFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZFS</span></a> Right Now! c 2007,<br>by Jeff B,<br>(only slides) <a href="https://www.usenix.org/legacy/event/lisa07/htgr_files/bonwick_htgr.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">usenix.org/legacy/event/lisa07</span><span class="invisible">/htgr_files/bonwick_htgr.pdf</span></a><br><a href="https://www.usenix.org/conference/lisa-07/zfs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">usenix.org/conference/lisa-07/</span><span class="invisible">zfs</span></a></p><p>-- introduction to ZFS of Sun Microsystems vintage</p><p><a href="https://freeradical.zone/tags/fileSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fileSystem</span></a> <a href="https://freeradical.zone/tags/trawlingUSENIX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trawlingUSENIX</span></a></p>
ax6761<p>Black-Box Problem Diagnosis in Parallel File Systems, c 2010,<br>by Michael P K, Jiaqi T, Rajeev G, Priya N,<br><a href="https://www.usenix.org/conference/fast-10/black-box-problem-diagnosis-parallel-file-systems" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">usenix.org/conference/fast-10/</span><span class="invisible">black-box-problem-diagnosis-parallel-file-systems</span></a></p><p>-- compares the metric histograms of the nodes</p><p><a href="https://freeradical.zone/tags/parallelVirtualFileSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>parallelVirtualFileSystem</span></a> <a href="https://freeradical.zone/tags/PVFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PVFS</span></a> <a href="https://freeradical.zone/tags/parallelFileSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>parallelFileSystem</span></a> <a href="https://freeradical.zone/tags/fileSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fileSystem</span></a> <a href="https://freeradical.zone/tags/trawlingUSENIX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trawlingUSENIX</span></a></p>
cybertrapped<p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/cs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cs</span></a> <a href="https://mastodon.social/tags/computer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computer</span></a> <a href="https://mastodon.social/tags/science" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>science</span></a> <a href="https://mastodon.social/tags/directory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>directory</span></a> <a href="https://mastodon.social/tags/fileSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fileSystem</span></a> </p><p>Yesterday I extracted the contents of an initrd.img that came packaged in a Fedora distribution. From kernel.org I learned this mini-os can be used by the kernel during the bootup process. </p><p>I guess I could have mounted the directory to play with the tools it is configured with. But I realized I do not know the difference between a directory and a file system. </p><p>Please help me understand what is the difference between these two concepts.</p>
ax6761<p>... Note that "df | awk" &amp; "zfs list" commands are not equivalent ...</p><p>1.a- "<a href="https://freeradical.zone/tags/df" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>df</span></a>(1)" will only have output for the mounted file systems.</p><p>1.b- "zfs-list(8)" will have output for both {un,}mounted file systems.</p><p>2- Related to above, if another file system is mounted on a mount point, "df(1)" will show the later. While <a href="https://freeradical.zone/tags/ZFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZFS</span></a> will still show the dataset as being mounted (same named property with value of "yes") even if it shadowed|hidden.</p><p><a href="https://freeradical.zone/tags/fileSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fileSystem</span></a></p>
ax6761<p>"df(1)" output processing in "awk(1)" to fetch the <a href="https://freeradical.zone/tags/ZFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZFS</span></a> dataset from the <a href="https://freeradical.zone/tags/fileSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fileSystem</span></a> mountpoint on <a href="https://freeradical.zone/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> 14 …</p><p>df -t zfs --libxo=json,pretty /var/{cache/pkg,db} \<br>| awk '/"name":/ { gsub( "(^\"|\",?$)", "", $NF); print $NF }'<br>var-2/cache-pkg<br>zroot2/var/db</p><p>Does anyone have a better idea (besides parsing "zfs-list(8)" output)?</p><p>Ha! Simpler …</p><p>zfs list -H -o name /var/{cache/pkg,db}<br>var-2/cache-pkg<br>zroot2/var/db</p><p>Included in that is "sort -u" as bonus!</p><p>Eh, not quite☝ <a href="https://freeradical.zone/@ax6761/114845144411769287" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">freeradical.zone/@ax6761/11484</span><span class="invisible">5144411769287</span></a> …</p>
SciPunkIn the movie Hackers (1995), a group of nerds hack into computer networks to outsmart corrupt authorities and uncover a conspiracy. <br> <br> The film features a mix of retro computing aesthetics, cyberpunk themes, and real-life cybersecurity concepts like sudo and root access.<br> <br> <br> <br> <a href="https://pixelfed.social/discover/tags/hackers?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#hackers</a> <a href="https://pixelfed.social/discover/tags/retro?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#retro</a> <a href="https://pixelfed.social/discover/tags/computing?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#computing</a> <a href="https://pixelfed.social/discover/tags/cybersecurity?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cybersecurity</a> <a href="https://pixelfed.social/discover/tags/cyberpunk?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cyberpunk</a> <a href="https://pixelfed.social/discover/tags/movies?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#movies</a> <a href="https://pixelfed.social/discover/tags/sudo?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#sudo</a> <a href="https://pixelfed.social/discover/tags/root?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#root</a> <a href="https://pixelfed.social/discover/tags/god?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#god</a> <a href="https://pixelfed.social/discover/tags/cyberspace?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cyberspace</a> <a href="https://pixelfed.social/discover/tags/datasecurity?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#datasecurity</a> <a href="https://pixelfed.social/discover/tags/hacking?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#hacking</a> <a href="https://pixelfed.social/discover/tags/computers?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#computers</a> <a href="https://pixelfed.social/discover/tags/network?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#network</a> <a href="https://pixelfed.social/discover/tags/blackhat?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#blackhat</a> <a href="https://pixelfed.social/discover/tags/whitehat?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#whitehat</a> <a href="https://pixelfed.social/discover/tags/cyberpunkaesthetic?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cyberpunkaesthetic</a> <a href="https://pixelfed.social/discover/tags/computers?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#computers</a> <a href="https://pixelfed.social/discover/tags/filesystem?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#filesystem</a> <a href="https://pixelfed.social/discover/tags/fisherstevens?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#fisherstevens</a> <a href="https://pixelfed.social/discover/tags/pennjillette?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#pennjillette</a>
argv minus one<p>I wanted to store some <a href="https://mastodon.sdf.org/tags/BorgBackup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BorgBackup</span></a> archives on an <a href="https://mastodon.sdf.org/tags/exFAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exFAT</span></a> disk so that any operating system (not just <a href="https://mastodon.sdf.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>) could easily read it, but Borg needs a journaling <a href="https://mastodon.sdf.org/tags/filesystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>filesystem</span></a>. 😢</p><p>In theory, there isn't any reason why journaling can't be implemented on FAT 🤔 but everybody probably doesn't consider it worth the effort.</p><p><a href="https://mastodon.sdf.org/tags/NTFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NTFS</span></a> would work too, except some of the <a href="https://mastodon.sdf.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> machines I run Borg on are running Debian Stable, whose old kernel lacks the ntfs3 driver. 🤦‍♂️</p>
Grumpy Old Techie 🕊️<p>Things I like about FreeBSD:</p><p> "You can tune a file system, but you cannot tune a fish."</p><p>is still listed as a bug in the tunefs man page on FreeBSD 14.3<br>I first saw it more that 30 years ago on SunOS that was BSD based at the time.</p><p><a href="https://hostux.social/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://hostux.social/tags/filesystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>filesystem</span></a> <a href="https://hostux.social/tags/unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unix</span></a> <a href="https://hostux.social/tags/sunos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sunos</span></a></p>
Orhun Parmaksız 👾<p>Found a handy CLI tool for Git &gt;_</p><p>🔍 **git-statuses** — Display the status of multiple Git repositories in a clear, tabular format.</p><p>🌀 Scans directories recursively for Git repositories</p><p>🦀 Written in Rust!</p><p>⭐ GitHub: <a href="https://github.com/bircni/git-statuses" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/bircni/git-statuses</span><span class="invisible"></span></a></p><p><a href="https://fosstodon.org/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a> <a href="https://fosstodon.org/tags/git" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>git</span></a> <a href="https://fosstodon.org/tags/repository" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>repository</span></a> <a href="https://fosstodon.org/tags/scan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scan</span></a> <a href="https://fosstodon.org/tags/filesystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>filesystem</span></a> <a href="https://fosstodon.org/tags/commandline" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>commandline</span></a> <a href="https://fosstodon.org/tags/vcs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vcs</span></a> <a href="https://fosstodon.org/tags/terminal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>terminal</span></a></p>
Christian Noll<p>A Higgs-bugson in the Linux Kernel - by Nikhil Jha</p><p><a href="https://blog.janestreet.com/a-higgs-bugson-in-the-linux-kernel/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.janestreet.com/a-higgs-bu</span><span class="invisible">gson-in-the-linux-kernel/</span></a></p><p><a href="https://mas.to/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://mas.to/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mas.to/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://mas.to/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a> <a href="https://mas.to/tags/bug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bug</span></a> <a href="https://mas.to/tags/filesystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>filesystem</span></a></p>
Blake Patterson<p>My daughter has a friend whose sibling is no longer alive, as of recently. The family wants to access their MacBook Pro which is password protected. It's a fairly recent model, apparently, and it's unclear whether the disk is encrypted -- prob safe to assume it is (?). </p><p>Is there something Apple can/will do to help the family gain access, given proof of the situation? </p><p><a href="https://oldbytes.space/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> <a href="https://oldbytes.space/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://oldbytes.space/tags/Mac" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mac</span></a> <a href="https://oldbytes.space/tags/filesystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>filesystem</span></a> <a href="https://oldbytes.space/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://oldbytes.space/tags/FileVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FileVault</span></a> <a href="https://oldbytes.space/tags/password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>password</span></a> <a href="https://oldbytes.space/tags/access" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>access</span></a></p>
Ariadna Vigo<p>Don't forget that your filesystem is a database you can use as such. I've been writing a diary of sorts, where each entry is just a text file, with the current date as its filename.</p><p><a href="https://social.tchncs.de/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://social.tchncs.de/tags/filesystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>filesystem</span></a> <a href="https://social.tchncs.de/tags/diary" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>diary</span></a> <a href="https://social.tchncs.de/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a></p>
Thorsten Leemhuis (acct. 1/4)<p>"[…] we observed that the df command shows higher space utilization compared to du when many small files are copied. Over time, the outputs of both df and du converge. This happens because <a href="https://hachyderm.io/tags/XFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XFS</span></a> initially reserves additional space for these files.</p><p>The feature that causes this behavior is Dynamic Speculative End of File (EOF) Preallocation. This feature allows files to dynamically reserve more space to prevent fragmentation in case the file is grown later on. This blog post explores what this feature is, how it works, and how it can be beneficial for certain use cases. […]"</p><p><a href="https://blogs.oracle.com/linux/post/du-vs-df-in-xfs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.oracle.com/linux/post/du</span><span class="invisible">-vs-df-in-xfs</span></a></p><p><a href="https://hachyderm.io/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://hachyderm.io/tags/Kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kernel</span></a> <a href="https://hachyderm.io/tags/LinuxKernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxKernel</span></a> <a href="https://hachyderm.io/tags/Filesystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Filesystem</span></a></p>

File encryption with a browser.

I've been exploring the #WebCryptoAPI and I'm impressed!

When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

Live Demo: dim.positive-intentions.com/?p

Demo Code: github.com/positive-intentions

Hook Code: github.com/positive-intentions

IMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

dim.positive-intentions.com@storybook/core - Storybook