Category: Uncategorized

  • It continued like this…

    It continued like this…

    Last time on Dragon Ball Super Hold on!

    That’s not my story.

    In my last rambler— Don’that sound like a car? “She drives a Jeep Rambler”, right? So where was I, oh…

    Design.

    It was something about LCDs and 1U servers, to be continued, and sound effect. Give or take. So this is continuing it.

    At 144 layers, this was my next attempt on designing a wireframe-(read:-simple-lines-one-color-icon)-looking server.

    I spent maybe a bit too much time drawing contrasting borders the supposedly wireframe thing so it would be usable on any background, and at the same time tried to blend colors so the border of these borders I drew wouldn’t be noticeable that at some it started looking like fake photorealistic or something. So I just ran with it. The hardest part to make was the sticker on top.

    It has a couple of new effects that I wasn’t sure I was going to get correctly: the first is the numbers below the drive slots, which is the same effect on the footer of the site when two gradients with “inverted polarity,” is the best way I can explain it, almost intercept the same color at the same distance but y’know don’t, because otherwise if both have the same color at the same time text wouldn’t be visible.

    It’s very simple but it creates sort of an effect of laser-etcher aluminum or some other metal.

    If you’re like “beesh, wha?”, probably this isn’t make much sense maybe, huh? See:

    It look fucking awesome, much better than the 5s, with full black face, instead of the hideous black square (the display) framed in white in non-dark iPhones had, before Apple finally learned that looks cheap and tacky, unfortunately it took a decade it a decade to get there.T he hot pink shell also was made of aluminum with the little black RF windows those iPhones had in the back and the gorgeous light-catching chamfered edges. I have pictures of it but I zipped them all up and put them on a server, fed up that all people seemed to be taking pictures anymore was for putting them on Facebook and have somebody like them — by the way, if you’re new here Imma be chasing so many tangents it’ll make your head hurt. Seriously, this could be stressful for some people, maybe you should go to another site. There’s no Twitter anymore, this is my space to vent. My HVAC. I have ADHD+OCPD too and the house’s dyslexia for appetizer, be warned — I had an Instagram account way before it was known. I had like 11 pictures because I don’t take pictures of food (when it’s not funny) or selfies. I hate selfies, specially mirror selfies. They’re the epitome of shallowness, I think. There are exceptions to the rule though; dickpics are okay. I mean yours, I don’t take those either, well… not to send them. I grew up at the same time digital cameras and the Internet were also growing up, back when the rules were first being established. That, and I had a very vindictive and bored ex, so I learned fast not to do that. We became made up, became friends, started doing drugs and fucking our other friends together, it worked out in the end, but no pictures. That said, if you feel like sharing and I’d be more than happy to admire your “artwork”. I may even congratulate you, thank you, or put up score cards depending on the day, I will definitely not #metoo you or anything like that. Safe space. “Your cock is my cock,” or how was it?

    The other effect is the… um… Remember the iPhone 5 but really more the iPhone 5s? This effect I’m referring to was substantially more pronounced in the 5s, its [very fragile] aluminum case had chamfered edges that caught the light beautifully. When I upgraded from the 5 to the 5s — sidenote: remember when newer iPhones were upgrades? That’s stopped being true around the iPhone XS, …Xs? Who cares — I ordered on eBay for about 10 dollars (USD) a hot pink shell for my old iPhone 5.See? There’s obviously a little more put into it.

    The other effect is the… um… Remember the iPhone 5 but really more the iPhone 5s? This effect I’m referring to was substantially more pronounced in the 5s, its [very fragile] aluminum case had chamfered edges that caught the light beautifully. When I upgraded from the 5 to the 5s — sidenote: remember when newer iPhones were upgrades? That’s stopped being true around the iPhone XS, …Xs? Who cares — I ordered on eBay for about 10 dollars (USD) a hot pink shell for my old iPhone 5.See? There’s obviously a little more put into it.

    It look fucking awesome, much better than the 5s, with full black face, instead of the hideous black square (the display) framed in white in non-dark iPhones had, before Apple finally learned that looks cheap and tacky, unfortunately it took a decade it a decade to get there.T he hot pink shell also was made of aluminum with the little black RF windows those iPhones had in the back and the gorgeous light-catching chamfered edges. I have pictures of it but I zipped them all up and put them on a server, fed up that all people seemed to be taking pictures anymore was for putting them on Facebook and have somebody like them — by the way, if you’re new here Imma be chasing so many tangents it’ll make your head hurt. Seriously, this could be stressful for some people, maybe you should go to another site. There’s no Twitter anymore, this is my space to vent. My HVAC. I have ADHD+OCPD too and the house’s dyslexia for appetizer, be warned — I had an Instagram account way before it was known. I had like 11 pictures because I don’t take pictures of food (when it’s not funny) or selfies. I hate selfies, specially mirror selfies. They’re the epitome of shallowness, I think. There are exceptions to the rule though; dickpics are okay. I mean yours, I don’t take those either, well… not to send them. I grew up at the same time digital cameras and the Internet were also growing up, back when the rules were first being established. That, and I had a very vindictive and bored ex, so I learned fast not to do that. We became made up, became friends, started doing drugs and fucking our other friends together, it worked out in the end, but no pictures. That said, if you feel like sharing and I’d be more than happy to admire your “artwork”. I may even congratulate you, thank you, or put up score cards depending on the day, I will definitely not #metoo you or anything like that. Safe space. “Your cock is my cock,” or how was it?

    At 470+ layers

    Is that thing above. The list of layers is massive but it’s organized in groups so it’s manageable. The need for that organization gave me the next idea:

    You can disassemble it !

    Above is with the grill and rack mount ears’ covers removed. Below, with the display removed, leaving only its support arm and rainbow cable, I don’t know how I’m only now catching that detail.

    Rack mount ears removed:

    Display assembly support arm removed:

    Disks removed:

    And yes, I’m recycling the top cover and will continue to recycle for as long as it matches because it was sooo annoying to make. I hate it.

    While doing a network map to ask for assistance in some forum, I made some shapes to depict routers and what not. I did this trapezoidal rectangles so they’d fit a word inside for the network map they were supposed to represent.

    Next thing I knew I had drawn 1121 layers, well, not all at once. I tweaked a few things some days later.

    This is G3 (borrowing from HPE ProLiant servers,) it disassembles as well, but it doesn’t have as many layers in that way:

    Above, fully assembled. Like in the previous one, the display is a capacitive touch screen. I mean, if I’m gonna make believe, I’m gonna go all out, right?

    That said, it’s still a monocromatic OLED display. There are certain gestures that you do during booting to enter boot selection and shit like that, I thought a lot about this and made designs only to support this image where it’s not even visible.

    Hmm… I have issues.

    If you remove the display, the fan assembly is exposed. The server is not supposed to stop. Proximity sensors slow down each of the fans as you get closer to them. Touch the center to arrest it. Push the center to release the fans from the spring-loading mechanism:

    Something very expensive to make would be that the disk lay behind the fans, not the other way around. I mean, it keeps the disks cool and looks badass, don’t it? Plus, for me, it’s free to make; I have the wannabe-designer’s discount.

    There’s a second display inside, but it’s not a real display, but it’s like that edged glass or acrylic that it’s lit from out of sight and things one it appear like holograms floating. I’m sure you know what I’m talking about. Hey, don’t look at me. They blew all of the budget in a hot-swapping disk magazine behind the fan assembly.

    Do you know how fucking expensive that must be?

    Oh yeah, I forgot, while the server is on you are supposed to indicate in the front display or remotely that you will swap a disk, it starts ramps up the fans, and starts lightly throttling the load so things cool inside, that way you have like a minute or two to swap a disk while the fans are removed. Of course there would be at least two more fans inside or in the back in the power supplies.

    That’s it. No more layers. Noticed the USB ports, BTW?

    I could’ve removed them but servers from some reason no matter how advanced they are, they have always one compromise like that, a fixed front I/O assembly that leave a square hole in just off-center to the left of the front grill.

    It was kind of annoying to make because I had to design all layers about that flaw.

    In the fan assembly, if you look closely, there’s a rainbow cable and exposed contact port for the display that is locked in in this piece.

    There’s one more, or two, IDK. Maybe later.

  • Pigging out in Breath of the Wild

    Pigging out in Breath of the Wild

    You know The Legend of Zelda right? You have to, it’s older than time.

    I just started playing Breath of the Wild, one of the latest games in the series, and I’m using latest sort of loosely since the game came around the year 2000 on the Nintendo Switch and Wii U, I believe. I think I have one of those BTW (a Wii U), it’s been loaned for several years. I hope it’s still there.

    As it is tradition of mine, I’ve play most of the game with some sort of computer nearby for help. I’m not a good or even decent gamer, but I have fun and cheating with walkthroughs and whatnot doesn’t spoil the game for me, on the contrary, it gets me excited to get there and see it from myself regardless if I already watched the actual video on YouTube, or this IGN site, or whatever. Sidenote: I feel the same way about movies and TV shows, I need to know what happens before I watch it. I guess I need to control my excitement, I dunno what it is.

    Back to the game with the little mute transvestite, or is it cross-dresser? I don’t know. Leave your comments below. Psych ! This ain’t YouTube.

    Piggying out AKA cooking in Zelda is a little confusing because there are hidden metrics, this does this, but another of this does that.

    Eventually I got the hang of it, if you need help with it, refer to other sites, I’m here just to mention what I did not see anywhere. Not on YT, not on several Zelda wikis or even on this IGN site. It might be IGM, I don’t know, I’m not sure but only because I definitely don’t care.

    There are several food groups right? (I’m including critters and all potions shit in that). The basic food without boost/buff restores health. There’s no equivalent basic food for stamina, the other meter you need to be aware of.

    Oh, by the way, this would only be useful for anybody if they have at least the first row of heart containers complete, and you’ve maxed out your permanent stamina. At this point it’s very likely you’ve the LCD1 has gotten a few outfits for her drag show or not to need any boost meal so you can focus on doing health and stamina replenishing meals. She just needs two garments to get immunity to heat, cold, shocks, vaginas, you name it, so that leaves space to wear a nice little sash but since there aren’t any, your best bet will often be Gerudo Trump helmet, it’s golden and so tacky, but in one piece you get lightning immunity.

    With that done, let’s get to the health replenishers first. This is what I never saw anybody mention. If you have enough, but not all possible heart — or even if you do, since I believe you can’t get the two full rows if you maxed stamina — the only health boost meals you’re ever going to need are those that say something about “max hearts” in the end of the description. AND, this is the part seemingly ignored: YOU ONLY NEED ONE INGREDIENT, that’s it.

    Every ingredient that maxes out (that gives you additional temporary yellow ones after the permanent red ones) your hearts, replenishes those before the yellow ones. You don’t need to add enough items in the meal to get the max and go beyond it, you go beyond it with the first item you, since it’s not a timed boost either, you don’t need any other ingredient. Adding a second item will increase the number of yellow hearts, but I wouldn’t (and I don’t) do that because it would only add two-to-four extra yellow hearts and ingredient, whereas if I use it alone it would add that same number of yellow hearts plus all the red ones leading up to them.

    I would love if somebody had clarified this sooner, or clarifies it now in some popular Zelda mm..whatever but as I said, the game is so old that bringing it up myself would be like opening an old thread or whatever.

    There’s another important characteristic of health augmenters that makes this I think the smarter way of cooking which is that the additional health is overwritten by another meal with the same effect. It doesn’t add up. Meaning if you have only one row of hearts and you cooked a meal with IDK, 4 spiky yellow fruits for another row? Each spiky yellow thingy give you 4 yellows I think, and I think each row is 15 hearts.

    So if you cook 4 in a meal and eat it about to die you get close to 30 hearts. If you accidentally eat another heartboost meal because you’d likely be in a rush when doing this, you immediately lose most of the second row. If you had cooked them separately though and eaten them about to die, insteald of 30-ish hearts, they’d total 75 if you can manage to eat each yellow thingy with a quarter heart left. i.e.

    ( 14.75 + 4 ) 4 = 75
    where
    ( replenished + additional ) yellowthingy = total heart yield

    Whereas all in one meal

    14.75 + ( 4 × 4 ) = 30.75
    where
    replenished + ( additional × yellowthingy ) = total heart yield

    The same goes for stamina, replenishers are good if you have no augmenters, otherwise like regular food, they’re just wasting food space, because as it turns out the lunch box’s space (or however she carries here meals and duct tape) isn’t infinite.

    And there it is, my first unsolicited advice on something I don’t really care that much about, or even am good at, but fuck it, it’s Friday.

    It must be somewhere, right?? That’s how it works, when you don’t have the right day you just call another country;

    Allô France? Ça va salope ! Écoute, putain; n’auras tuuu.. ben.. un vendredi que je puisse utiliser, s’il te plaît? Merci mon coeur, t’es la meilleure, très masculin, grrr ! Je vais te sucer ça délicieuse bite grosse que t’en as à la prochaine ! D’accord, alors, ben— à plus, mon petit cul TBM, j’t’aime !

    If you haven’t played the game, you should give it a go if you own a Switch (not Switch 2, that thing will never belong to you.)

    The game is currently free, if you get from unofficial channels, such as pirated. Don’t worry, Nintendo is okay with it, they accounted for the freebies in the otherwise-raised-simply-because-they-could-price of the official copies. It’s the only logical explanation, and they wouldn’t simply just raise the price because they can, as Nintendo of America’s CEO said, he was probably joking because Nintendo is not evil like that (except only in most and sometimes all of its commercial practices), so the only other meaning that might have is that he’s practically begging you to download it elsewhere.

    1. Little crossdresser, or Link, the crossdresser, whichever you prefer. ↩︎
  • Why does Google need my phone number to confirm it’s “me”?

    Why does Google need my phone number to confirm it’s “me”?

    This was going to be posted on Google’s support forum, because of course it’s doesn’t have proper support for customers. IT got a little too long so I’m not sure if I’m still going to post it but nevertheless people should be aware of Google’s behavior.

    I tried signing in on one of my Google accounts, it’s a semi-burner-type because I don’t want to associate personal information with it.

    Anyway, yesterday it decided that it wouldn’t let me sign in anymore. The process implies that the password is wrong, and for a bit it made me second-guess myself, but I’m good with passwords (without MFA) so it didn’t seem right. I entered a deliberately wrong password to see what happened, and indeed the denial was much quicker and it was no longer suggesting that I might have my password wrong, it was outright stating it.

    Each time, by the way, this would happen (i.e. I correctly entered my password), it would automatically initiate the I-haven’t-tracked-you-with-this-IP-address-yet internal protocol or whatever, so it would send me a code over email. I guess this is a good time to tell I’m not using an account that ends in @gmail.com but uses my own domain, on my own servers (this is only a Google account with no Gmail) meaning IF I HAVE ACCESS TO THE ACCOUNT it should be enough to satisfy those identity concerns as far as Google’s involved, because it would mean I have control of DNS servers, registrar account, mail servers, proxies, directory servers, and all the ridiculous amount of complexity that email requires worked out, but that was not the case.

    Instead, it’s completely glossed over and what really happens is that as soon as I enter that code that was sent automatically without any warning or consent (as I never set up MFA in the first place) I get another blank field to enter a mobile number so Google can know for sure it’s me by sending me yet another code.

    How exactly would that work? How can that be possibly be tied to me if I had never given Google a phone number to match it with. More importantly, as an authentication factor, this would fall under a possession factor, but I already used that with the emailed code.

    Email provided by Google would be normally unlocked with the same password used to login to an account. That’s something you know, the knowledge factor. Assuming your in the vicinity of where you normally access you account from, that already should be enough for multi-factor authentication because another factor that Google doesn’t acknowledge as a factor is someplace you’re in, the location factor, that’s unless you fail to meet it because then the fact that Google is tracking your location whenever or however it can, can be spun as a matter of security and not a matter of privacy, as it would be “revelatory” of that well-known thing.

    But let’s pretend that’s not a thing and get to the code; in order to receive it I would need to have access to my non-Google provided email account. That is something you have. The possession factor. It’s the same thing as having a valid SIM card (itself a form of smart card) to authenticate to your carrier and get that message with the code. Your carrier might even have the option of forwarding text to an inbox or you might have a VoIP line that forwards your texts to anything with an API such as Telegram, I used to do this. Regardless, it’s still only something you have.

    What it is not is something Google has, or probably more appropriately something Google wants. Assuming my account has really been compromised and already I passed at least two of five authentication factor, where only 4 are really practical after taking out behavioral, and only 3 are really practical after taking out biometrical given those two (as well as location but I guess we’re ignoring that) are extremely invasive, this is why in the case of biometrics an in-device verification is often used instead (I checked that box too but that only works with an in-device account, not in-browser even the browser is on the device signed in. Unless it’s Googles’ own browser). The one remaining is the one unrecognized but already failing: location. Which is often what triggers all of this nonsense. Google from my point of view wants confirmation of the places you visit.

    Again assuming my account has been compromised, and if they have access to email my personal safety has been compromised as well asking for phone number to get a code, would not constitute another factor I have already presented. It wouldn’t constitute a factor at all because Google has no way to verify the phone number with nothing to match it against. An if I have truly been compromised, it would have no way to know it’s handing a third party an opportunity to lock me out further by adding information to my account I could never match, and compromising Google’s own data in the process.

    Google sign in/up pages say to prevent lock out by entering a phone number. Why would I be locked out for non matching and why must it be a phone number. Why not a key pair, it’s the standard and the base of all security, it’s used in many things from physically as some form of smart card (SIM card, ATM cards, ID cards, public phone cards) or in their virtual form best and most often known as certificates, or more recently passkeys which can prove possession and in turn verify identity without disclosing that identity, if Google is so concerned for user security and privacy, or arguably their wellbeing, as it claims.

    If Google is so concerned for it, in the troubleshooting article about account access, when all methods requiring personal identifiable information aren’t met, why is Google so quick to suggest to “just open a new account”. To me that sounds as it doesn’t really care if you ever get access back, or what might happen with your recurring charges if you have any, as long as you have another account for Google to keep tabs on you. You could make a video call with an ID in hand, it’s still invasive, it’s not perfect but it’s a solution for those that chose to rely on Google for anything just finding out that relationship wasn’t as symbiotic as they thought.

    Google doesn’t seem to be interested on identifying the accountholder being the same but rather the accountholder themselves.

    They’d be left without access to cancel subscriptions, or email to change the basically anything relating their other accounts, including the bank’s to kill those cards. That’s hardly caring about their wellbeing.

    Using a phone number isn’t even reliable security either as your carrier could hypothetically reassign your phone number to another person out of the blue and there goes your MFA. It’s not, or it wasn’t hypothetical for me, it’s what AT&T did to me a few years back, hence I’m not attached to a phone number or a device that is not autonomous (that requires to be signed in somewhere).

    How do I know it’s not going to abuse it, because on the same message where it asks for the phone number it says that Google would store this phone number BUT ONLY for security purposes, it was missing a “pinky swear yoo-guyeess”.

    It reminded me to all the times it has allegedly stored data for security purposes but then proceeded to abuse using a loophole like that class action suit (that might be still ongoing) against Google that which I was notified I’m in; where the last thing Google did was asking to dismiss the case, proving to me it has no remorse for its behavior, nor respect for the users that make it money.

    In any case if Google has so. much. concern. — so much! — for our accounts, and privacy, why does it keep implementing measures that require a server, a Google server to work. Most of the Google’s services don’t work correctly in my network because the firewall blocks trackers. I didn’t choose nor single out Google, the block comes from automatically updated crowdsourced blacklists, meaning the entire planet deemed its servers adversarial by adding them in these lists. Case in point; as I type this, yet another burner account was triggered Google’s unsolicited[, probably location-tracking-based-]protection, and [also without being solicited] made my Android device a piece of its MFA puzzle, but since it cannot properly communicated with block servers, I assume, the messages twice over the maximum time allowed to complete the whole thing only to show up.

    Then it froze when I tapped on the green checkmark to confirm that my online activity is dull, not as exciting and dangerous as Google, Apple, Microsoft, Amazon and others with an urge to identify me personally (rather than just recurringly) paint it to be with all of this spy craft. Which is in part the reason I was driven me away to set up and maintain my own services. And why I only keep burner accounts from these, which in turn doesn’t compel me to spend much if anything at all at their stores because I can lose access on their whims. Unfortunately Google is demanding for a phone number even for these accounts now, it’s rather disingenuous way to confirm identity or that I’m not “a bot” coming from a member of the so called FIDO alliance so I’d really really like to hear the reasoning behind it. With hard emphasis on reason-. Security or privacy-related reasons, that’s what it’s claimed, so let’s hear it.

    If Google is serious about security or privacy, maybe start at home? Make your servers reputable again (ship sailed though. Ship already found all wrecked growing a coral reef too) because its alleged intentions with it seem unquestionably, blatantly, transparently insincere.

  • Creating links in UNIX filesystems

    Creating links in UNIX filesystems

    This should be pretty straightforward, yet sometimes I find myself reading for the millionth time the manpage. Perharps this is more memorable.

    Symbolic links (AKA symlinks) and hard links are both created with the same command (ln) and it follows the same syntax as the cp or mv commands. In most cases that would be:

    <command> <“-s”-option-if-symlink> <original-or-source> <where-to-place-the-thing-in>
    e.g;

    • ln -s /etc/someapp/somefile.conf /home/serveradmin/tempbackups

    TARGET vs DESTINATION

    The part I think is confusing is that when working with files e.g. moving and copying, which is the thing regular users associate the most with filesystems, TARGET means “the place to send it (the file to copy or move)” while SOURCE would be the original. Whereas the with ls command, TARGET is used like it’s used in web pages that is TARGET as in the target of a hyperlink (or nowadays just “link”).

    That’s kind of the thing about it; files listed by a filesystem are indeed like links on a web page (I’d say specifically a wiki) they’re associations to the data itself. These associations are called hard links, and like web pages [of a wiki], as long as one exists to the data, you’ll be able to make it to the data, but when when you delete the last hard link — though your data might still be there, and likely it is — without really knowing your shit it would be impossible for you to get back to the data if the link is gone.

    Putting it in that context it makes sense again, but when you’re in the command line working with files, where that’s universally known as the SOURCE (remember, most filesystem operations involve moving or copying), maybe a little clarification on the manpage wouldn’t hurt, but y’know, Linux devs are very smart but they lack an aesthetic-, and common sense.

    If you happen to be a Linux dev, or any dev really, please don’t take offense, instead put lots of emphasis in common of common sense. Y’know… like us lowly commoners who aren’t up to your level. We aren’t. Help us up. Spending just a little extra time putting things in a way we might have less issue understanding can mean you’ll have more people there with you. You’re brilliant, you understand patterns, it shouldn’t take you too much. I don’t make apologies about aesthetics though. Why so much obsession for Ubuntu orange, Material Design. Ubuntu is hideous there a reason orange is used on inmate (not judging) jumpsuits, Material is uninspired and uninspiring at best. Aero, Metro, Aqua? Bitch, please1.

    Having said that, you should be able to figure it out on your own, but since this document is also for future me who I know won’t be patient enough to read about this [yet] again, I’ll add some easy to spot examples for that lazy motherfu****.

    Single-argument form

    If you are in the directory where you want to create the symlink, i.e. inside the destination container, you may drop the second argument e.g;

    serveradmin@www:~/tempbackups$ ln -s /etc/someapp/somefile.conf
    serveradmin@www:~/tempbackups$ ln /etc/someapp/somefile.conf

    These would create the file ~/tempbackups/somefile.conf2.

    Send-to-a-container forms

    • ln /etc/someapp/somefile.conf /etc/someapp/somefile.ini /home/serveradmin/tempbackups
      • i.e. ln FILE1 FILE2 DESTINATION
    • ln -t /home/serveradmin/tempbackups /etc/someapp/somefile.conf /etc/someapp/somefile.ini
      • i.e. ln -t DESTINATION FILE1 FILE2

    The first of these is the most commonly used syntax (mentioned at the beginning). Both of these create one or more pseudo-copies3 on a destination directory (/home/serveradmin/tempbackups), which is the main difference from the following form,

    Specifying a new name

    • ln -T /etc/someapp/somefile.conf /home/serveradmin/tempbackups/app-parameters-change-here
      • ln -T NEW-NAME-AND-OR-PATH FILE1

    Rules and background

    • [Hard] Links are also known as inodes (index nodes,) associates a name to a file on a filesystem. For each file there must be at least one hard link. i.e. Most files in a filesystem are hard links.
    • Symbolic or soft links, point to the path where a file resides. Unlike hard links, they do not link to the data itself.
    • For hard links, the source (or “target”) must exist.
    • For both, the destination should not exist. You should in theory be able to overcome this with the -i or -f options but personally I have never been able to make it work.
    • You can only hard link files, not directories. It may be doable to hard link directories but it will not be trivial.
    • Rather uselessly4, you can change the permissions of a symlink itself with chmod in macOS but not in others. I suppose there might be exceptions.
    • File management commands such as mv and rm work on the symlink itself, which if viewed in some file managers — such as in macOS’s Finder where it appears as a file with a little “shortcut” arrow — they may be aliased (symlinked), deleted, dragged+dropped, and renamed as any other file keeping its associated file or directory unaffected.
      • However, be careful as some commands, e.g, cp, rsync, can recurse down through symlinks if using the right [and very common] options.
    1. Windows’ Aero, Metro and macOS’ Aqua UI suck if you have the freedom to place elements wherever and however you please. None can compete against the polish of GNOME3 despite its lackluster iconography and bad use of screen real estate nor against the insane potential Plasma Workspaces 6 (also despite iconography). Old Deepin killed it, Cosmic is a long way but onto something and moving fast. Take inspiration on those. ↩︎
    2. Where ~, means the same as $HOME or %{HOME}. That is the variable referring to the current user’s home folder. ↩︎
    3. They’re not actual copies of the data nor of the original link, they are new independent pointers to the existing data [that were based on the existing pointer] ↩︎
    4. Because Apple has rendered California-themed macOS worthless as a server, where this would be the most useful. ↩︎