alias alias-edit="vim ~/.local/config/alias_config && source ~/.local/config/alias_config && echo 'Alias updated. \n'"
alias ls="exa"
alias find="fdfind"
alias battery-full="system76-power charge-thresholds --profile full_charge"
alias battery-balanced="system76-power charge-thresholds --profile balanced"
alias battery-maxhealth="system76-power charge-thresholds --profile max_lifespan"
alias update-flatapt="sudo apt update && sudo apt upgrade -y && flatpak update --assumeyes"
alias tree="exa --tree"
alias devi-do="sudo incus exec dev0 -- su -l devi"
alias code="flatpak run com.visualstudio.code"
~
If you haven’t special requirements then just use Debian stable, and never be worried about an update again.
Or if you like beating your head against a brick wall constantly NixOS is really hard to brick. Any update that fails can just be reverted with a reboot.
Of course the downside is poor documentation, and nothing at all works like you expect it to work. It’s like hey, you want to learn Linux again from scratch? And by the way no two things work the same.
Headline: MAJOR EXPLOIT FOUND IN NEW LINUX KERNEL VERSION!
Debian: business as usual…
TBH I don’t even remember the last time some actually important bug came out on the kernel, long gone are the days of ptrace-kmod.c and hatorihanzo.c
A while back, somewhere around Linux 5.17, some Intel chips in laptops caused the Linux kernal to rapidly set backlight brightness to 100% then zero. This flashing would likely cause it to break. That’s the last one I remember only a year or so ago.
This only effected arch an it’s varients to my knowledge though, as they were the first to recieve the update, and it was fixed very quickly. To my knowledge nobodies systems were broken from this.
Ah yes, just like that time when Mandrake kernels burned the cd drives…
https://lwn.net/Articles/55815/