

The native directory sharing method for kvm is virtiofs. Have you tried it?
The native directory sharing method for kvm is virtiofs. Have you tried it?
Why not use Privacy Badger to prevent usage of tracking cookies?
I recommend to throw away this drive because blocks that are readable and writeable now, may fail soon. But if you want to use it anyway, it is possible to collect a list of unaccessible blocks usong badblocks
and pass it to mkfs
to create a filesystem that ignores that blocks. IIRC this is described in man badblocks
.
gksu
and kdesu
are unsupported for >10 years iirc, they were not more secure than sudo
and that’s one of the reasons they were abandoned. I’ve never heard about sux
. Polkit is a bit another thing that indeed replaced them, however it does not and can not separate GUI and non-GUI processes. The process itself has to fork, drop privileges and draw a GUI after that. There’s no difference between running it via sudo
or pkexec
, however polkit provide additional protections to prevent running unsafe apps with elevated privileges.
PAM and GVFS are not “privilege elevation frameworks” whatever you mean by this.
Idk what is bleachbit. But I know that “auth systems” can’t “handle GUIs in a secure fashion”. The app itself can be secure or not. By default they are not secure if they provide a GUI running in privileged process.
I know. Don’t do this. Read the manual.
It’s not when app was written. Wayland apps probably work with sudo, x11 don’t because sudo does not pass the environment variable. It’s a correct behavior of sudo because running x11 apps with root permission you create a security hole.
Too many files in a directory?
Probably? They won’t run with sudo
normally (in xorg at least). And only those explicitly allowed to be run with pkexec
by maintainers will do. Of course it is possible to evade this restriction, but you definitely should not.
deleted by creator
Sysadmin GUI tools are designed to be secure by isolating GUI from privileged process. That is not true for a random GUI app.
Nope. Running GUI as root in the same X server as unprivileged apps is insecure because each of them can take control over privileged window. IDK if this issue has been addressed in Wayland, but anyway there are no wayland-only distros nowadays.
Don’t do this. I’m unsure if this works in any distro, but if it does, this is unsecure.
Don’t do this. I’m unsure if this works in any distro, but if it does, this is unsecure.
I have no idea what you are talking about. The answer to your question is: this is impossible and this is done for purpose. Don’t try to work in linux like in windows.
Use bash-completion, it is much faster than clicking menus.
every distro I’ve tried has a strong sense that if you’re using the GUI you don’t need or deserve admin controls
GUI tools are not suited to be run as root in general. Few ones that are have special measures taken to prevent gaining privileges by another process, e. g. run a background non-GUI process as root and GUI communicating with it as an ordinary user. Such tools (package managers, system tweakers etc.) are usually configured to get required privileges via polkit (e. g. pkexec synaptic
to run GUI package manager in Debian). Don’t use sudo
to run GUI programs!
You don’t need to run any GUI programs as root.
Don’t search tasks for a tool. Search a tool for your tasks.
So Linux is not for you. Take a look at MS DOS 4.0, its sources were published few days ago.