GeistHaus
log in · sign up

LLVMpipe¶

docs.mesa3d.org
7 pages link to this URL
Application Isolation using NixOS Containers

Nowadays, if you use a computer, you are likely to run untrusted code and work with untrusted data. Everyday scenarios include executing a JavaScript code in a browser and opening an email in an email client. While any modern web browser and email client will provide some sandboxing, this is not a general case for most software. I find software development to be particularly risky because, as software developers, we tend to use various third party code from public repositories. In this post, I’m describing an approach to sandboxing specific to the NixOS. I found it surprisingly easy and flexible, so I thought that I might write about it. :)

2 inbound links article en posts nixossecuritylinux CC BY-SA 4.0
formicapunk

les humains, leurs machines, leurs languages. char greeting[] = "hello\n";

0 inbound links website en
Benchmarking 3D graphic cards and their drivers

I have in the past benchmarked network links and disks, so as to have a rough idea of the performance of the hardware I am confronted at $WORK. As I started to dabble into Linux gaming (on non-PC h…

0 inbound links article en debianflosslinuxgaming