• riodoro1@lemmy.world
    link
    fedilink
    arrow-up
    146
    arrow-down
    2
    ·
    edit-2
    1 year ago

    --no-preserve-root is a security option to keep you from accidentally removing all your files. Make sure you always use it along side the -f option and -r which stands for rescue - meaning rm will create a rescue copy of the deleted data.

    • darcy@sh.itjust.works
      link
      fedilink
      arrow-up
      20
      ·
      1 year ago

      the / means ‘working directory only’, a security feature to prevent accidently using absolute paths.

      • droans@lemmy.world
        link
        fedilink
        arrow-up
        32
        arrow-down
        1
        ·
        1 year ago

        -r means delete recursively. rm will by default only remove files, but with this flag, it’ll also delete all the folders, subfolders, and the files in those.

        --no-preserve-root disables a security check. A few years ago, this flag didn’t exist. If you ran rm -r /, everything on your system would be deleted, provided the user had permissions. Now, / is treated specially and rm will refuse to perform a recursive delete on it without the --no-preserve-root flag.

        -f means force and disables any prompts.

        rm -rf --no-preserve-root / would delete every file on your system.

      • Hildegarde@lemmy.world
        link
        fedilink
        arrow-up
        6
        ·
        edit-2
        1 year ago

        –no-preserve-root

        disables the wipe your system protection. Without this option rm can only wipe current directory if you input / as a location.

        -f

        means force, will not prompt the user for any reason.

        -r

        means recursive, rm will enter any directory selected and delete all the contents.

        rm -rf --no-preserve-root /

        The above command WILL wipe your system. It will delete all files your user has access to, and it will give you no feedback warning you what’s going on. Be careful.

        • Rai@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          3
          arrow-down
          1
          ·
          1 year ago

          Oh jeebus! Hahaha. Thank you so much for the explanation! I am extremely careful in terminal. I don’t find myself there often now that I’ve got my web apps set up.

          Now to learn how to successfully install something using Docker… There’s so many VARIABLES in Portainer to get something installed! I have not had one success as of yet, but I’m only on my first week of learning. Got it running as a file server successfully, though!

          Every TV in my house now gets King of the Hill RANDOMIZER and it’s bliss.

    • haulyard@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      Some poor soul is going to take this to the bank and have a horrible day. You could have at least told them to use the -p flag to protect any critical system files from being removed.

    • xylan@kbin.social
      link
      fedilink
      arrow-up
      8
      ·
      1 year ago

      That’s amazing that they would consider auto-generated responses to be appropriate in something which is supposed to be reference documentation. We are a good way from that type of querying and explanation being reliable.

  • Herding Llamas@lemmy.world
    link
    fedilink
    arrow-up
    36
    arrow-down
    2
    ·
    1 year ago

    I wouldn’t underestimate it. Many people said simular things when computers came out, or the internet was new. Think about AI now like a 1985 computer or 1995 internet. What you see now is the start of it, not the finished product. With all the money going into it combined with how computers / AI learns new things, it likely will be fast developments.

    This will date me a bit, but my school computer science teacher once told me that I wasted my money on a 2GB drive, because no one would ever use so much storage space in their life time.

    • Piecemakers@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      1 year ago

      … and then later that same year, no doubt: zip drives were all the rage. 🤪

      It still boggles the mind to look at the pic of that boiler-sized memory (1KB, IIRC?) from waaaay back next to a current micro SD card (nTB).

    • bitsplease@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      I don’t think many are doubting that AI is going places, it’s the folks who are talking about AI taking over all our jobs (particularly when they’re talking about high skill jobs) within a few years that we’re making fun of.

    • Spiritreader@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      1 year ago

      My brain once swapped the letters F and L in my head and I typed

      iptables -F

      Instead of -L.

      The standard input policy was drop. It was a VPS and I didn’t have access to the management panel. Fun times.

  • skillissuer@discuss.tchncs.de
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    1 year ago

    while i get that at some point chatgpt could have been mildly good at bolierplate programming, it’s much worse at chemistry. just ask it how to make aspirin

    • Zeth0s@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      1 year ago

      Is this answer correct? I can’t judge, as I have no idea how aspirin active compound is synthetized.

      Answer from gtp-4:

      Aspirin, also known as acetylsalicylic acid (ASA), can be synthesized through a chemical reaction involving salicylic acid and acetic anhydride. Here’s the general process:

      1. Salicylic Acid Preparation (if needed): If starting from other compounds like phenol, salicylic acid may need to be synthesized first.
      2. Acetylation of Salicylic Acid: Salicylic acid is reacted with acetic anhydride. [ \text{{salicylic acid}} + \text{{acetic anhydride}} \rightarrow \text{{acetylsalicylic acid}} + \text{{acetic acid}} ]
      3. Purification: The crude product is often purified by recrystallization, typically using a solvent like ethanol or water.
      4. Drying: The purified aspirin is dried to remove any remaining solvent.
      5. Characterization: The synthesized aspirin may be characterized using methods like melting point determination, infrared spectroscopy, or other analytical techniques to ensure purity and identity.

      In a laboratory setting, the reaction is often catalyzed by an acid such as sulfuric acid, which speeds up the process. The reaction is typically carried out at a moderate temperature, such as around 80°C.

      Safety precautions must be taken as the chemicals involved can be corrosive, and proper waste disposal is necessary.

      • skillissuer@discuss.tchncs.de
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        it’s essentially correct, but also it sounds like it was lifted entirely from students lab manual (either chemistry or pharmacy)

        • Zeth0s@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          1 year ago

          It is known that domain knowledge is superficial. One either needs a specifically trained model (such as med-palm2), or use some strategies to add memories, such as embedding databases