Skip Navigation
How can I easily and conveniently transfer files wirelessly between my linux computer and android phone?
  • LocalSend or KDE Connect. Syncthing if you need to sync files (Like an important documents folder that always needs to be up to date between your PC and Phone)

  • The EU are voting on Chat Control this Wednesday 19th June
  • Keep me updated Europe friends. If they implement this, for sure other countries will implement this as well.

  • Roses are red, violets are blue, everyone is using IPv6, why aren't you?
  • I wish my ISP had ipv6 support to be honest

  • How happy are you with your current distro?
  • Arch. ~3 y/o installation and I never had any significant problems with it. And yes, I have broke my installation a few times (I think only 2 times) but that is totally my fault (changing repositories, downgrading packages, changing critical system files, etc) and not something that would apply for every arch user.

  • Google avoids jury trial by sending $2.3 million check to US government
  • I hate google so much is unreal. Any other business/natural person doing things like this will cease immediately but google can do it.

    This is just one more demonstration on how colluded are Google and the US government.

  • Photoshop Terms of Service grants Adobe access to user projects for ‘content moderation’ and other purposes
  • Yes, with a virtual machine. But the experience will not be the best because the VM will lack a GPU. I'm sure there is ways to share some resources of the GPU with the VM to have a smoother experience but I have never done that on Windows

  • The real history behind the Lunix operating system

    BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the 'mp3' program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as 'telnet', which is used by hackers to connect to machines on the internet without using a telephone.

    8
    Added Bugs to Keep my job
  • Options for donation and contact links Nothing important

  • Millions of Docker repos found pushing malware, phishing sites
  • This is why I use my own Images if I can afford it.

  • Deleted
    *Permanently Deleted*
  • lmao what a fucker

  • Please help preserve your 3DS and Wii U SpotPass data before it's too late!
  • Ok. I already dumped it and my data was uploaded :p

    Thanks for this thread XOXO

  • Please help preserve your 3DS and Wii U SpotPass data before it's too late!
  • Nope lol. I will put it as a reminder so I don't forget about it later.

  • From its start, Gmail conditioned us to trade privacy for free services
  • I have my own email server and they don't block me AFAIK. I need to test more anyways

  • Fijxu Fijxu @programming.dev
    Posts 1
    Comments 29