Scam:
Was from outside of this list.
This info because someone thought I accused this list.
Sorry for the confusion I made.
BR,
Geg.

On Sun, 1 Aug 2021, 23:46 Polyna-Maude Racicot-Summerside, <
deb...@polynamaude.com> wrote:

> Hi,
>
> On 2021-08-01 9:58 a.m., Gunnar Gervin wrote:
> > I expected that answer.
> > Debian is still 1/2 of it, but kinda dysfunctional, cos of me & scam
> > Trying to set up Debian in a VM in another Linux distro, with Chef
> > So I cannot really see irrelevance
> > of my question?? Like Nobody here knows how to fix this one, cos it's
> > slightly out of D. politics?
> > Geg
> >
>
> Not because of politics.
> Because you don't seem to take help when it's given to you.
>
> At least 3 persons (different ones) have gave you tips on how to
> properly identify the OS you are running over (not only Linux but the
> distribution itself) and been trying to find out what you are using.
>
> Including one person that wasn't sure if your laptop description was
> because it was running Bullseye and wanted to be added to the list of
> computer supported or something else.
>
> None got any answer.
>
> So this may be the start of the whole problem.
>
> Now if you have a belief that people are trying to scam you off, them I
> can assure you of two things.
>
> You probably aren't a interesting target unless you are a bank or some
> big corporation. And if it would be the case, you wouldn't be
> interacting this way on the mailing list.
>
> If you got offer by someone you don't know to pay 100$ and get refunded
> for BTC, then you are mostly the first person to blame. This trick has
> been around for a very long time, and it's quite public notoriety that
> the first thing to do is to hangup on those person.
>
> If you come here for help and put a doubt behind every answer that
> people will give you. Then it could be good to ask yourself why you came
> here first ?
>
> Maybe you never answered to the two other users who asked you to type
> some command on the shell so we can know what type of system you run,
> this way we'd know if it's Debian (as we don't seem to be sure yet) and
> what architecture too. Because you talked about ex-Macbook, using BIOS,
> etc... pretty unclear.
>
> Nobody can undo what happened in the past. But if you need help, the
> first thing will be some genuine cooperation from yourself. Or going out
> to your local computer store and paying someone to do the job.
>
> And surely stop using some acronym only you may understand. It's not a
> run against the clock. Take time to write complete word and people will
> maybe have more interest in helping too.
>
> Why shall we make effort if you don't do so. If all the energy we have
> is devoted trying to decrypt some message then there won't be any left
> for the computer helping part of the job.
>
> > On Sun, 1 Aug 2021, 16:50 Andrew M.A. Cater, <amaca...@einval.com
> > <mailto:amaca...@einval.com>> wrote:
> >
> >     On Sun, Aug 01, 2021 at 04:30:45PM +0300, Gunnar Gervin wrote:
> >     > Security.
> >     > Rarely discussed in Linux(?)..
> >     > Was scammed recently; naive me let a man w/Bad accent take over my
> >     laptop
> >     > to 'help refund BTC' & make me pay 100$.
> >     > Because of that &/or me in Synaptic bloating (2 many) packages,
> >     which led
> >     > to "1t fix broken packages", "put in Debian 10.9 Netinst cdrom", &
> >     "can't
> *lt fin broken packages* ?
> lt ?
>
> let ?
>
>
> >     > find key file" messages (yes, all 3 !).
>
> find key file messages ?
>
> *yes, all 3!*
>
> what 3 ?
>
> >     > After trying "all" workarounds, I installed another, more simple
> Linux
> >     > distro, built up a new setup of relevant programs to build VM,
> >     containers,
> >     > websites, Debian iso image, & CHEF.
> >
> >     Which distro - are you still using Debian?
>
> Again this question ?
>
> How many time will it take before getting a bit of cooperation !?
> >
> >     If not, we can't really help you. Although many of us have run other
> >     distributions in the past, all of the Debian/Ubuntu derivatives do
> >     something slightly different - we can only really help with generic
> >     Debian things. If we offer help with any other distribution, it's
> >     only ever best efforts - Debian derivatives have their own support
> >     infrastructure.
> >
> >     > Now Chef asks me to give URL to continue setting up a VM etc.
> >     > Plz advise &/or help to do it/this.
> >
> >     It may not be relevant but the chef and chef-zero packages in Buster
> >     appear
> >     to no longer be packaged in Bullseye - the upcoming release due in
> >     two weeks.
> >
> >     Ask on a Chef list, perhaps?
> >
> A good shot would be to ask on a mailing list specific to this
> particular software (or a forum).
>
> >     > BR,
> >     > GEG
> >
> >     All best, as ever,
> >
> >     Andrew Cater
> >
> >     >
> >     > On Wed, 21 Jul 2021, 18:59 Dan Ritter, <d...@randomstring.org
> >     <mailto:d...@randomstring.org>> wrote:
> >     >
> >     > > Reco wrote:
> >     > > > On Wed, Jul 21, 2021 at 10:51:40AM -0400, Celejar wrote:
> >     > > > Numbers show that I was incorrect. Let's call it "unlikely"
> >     instead of
> >     > > > "rare". Let the popcon graphs speak for themselves:
> >     > > >
> >     > > > https://qa.debian.org/popcon.php?package=firefox-esr
> >     <https://qa.debian.org/popcon.php?package=firefox-esr>
> >     > > > vs
> >     > > > https://qa.debian.org/popcon.php?package=openjdk-11
> >     <https://qa.debian.org/popcon.php?package=openjdk-11>
> >     > >
> >     > > Standard reminder: popcon vastly over-represents
> >     > > individually-owned laptops and desktops over servers and
> >     > > corporately-owned anything.
> >     > >
> >     > > In this case, individuals are sometimes infected with ransomware
> >     > > by happenstance, but corporates are actually targets.
> >     > >
> >     > > > It won't by itself, of course. One sure way to beat ransomware
> >     is to
> >     > > > take immutable backups (i.e. unmodifiable by host during and
> >     after the
> >     > > > backup is taken), and as recent history shows us - ransomware
> >     victims
> >     > > > apparently do not use this approach.
> >     > >
> >     > > Yes indeed.
> >     > >
> >     > > -dsr-
> >     > >
> >     > >
> >
>
> --
> Polyna-Maude R.-Summerside
> -Be smart, Be wise, Support opensource development
>
>

Reply via email to