qaz@lemmy.world to Linux@lemmy.mlEnglish · edit-22 年前TIL You can use systemd-analyze plot > plot.svg to plot the service startup time to find bottleneckslemmy.worldimagemessage-square59fedilinkarrow-up1792arrow-down118file-text
arrow-up1774arrow-down1imageTIL You can use systemd-analyze plot > plot.svg to plot the service startup time to find bottleneckslemmy.worldqaz@lemmy.world to Linux@lemmy.mlEnglish · edit-22 年前message-square59fedilinkfile-text
minus-squareSkeletonek@lemmy.ziplinkfedilinkEnglisharrow-up8·2 年前It is, I have it set up on my laptop. It’s a bit finicky in how it works and it’s not easy to setup, but it is possible.
minus-squarestifle867@programming.devlinkfedilinkarrow-up3·2 年前Does it work by emulating the keyboard and typing in the password? Or by the encrypted protocol that works using the on device secret?
minus-squareSkeletonek@lemmy.ziplinkfedilinkEnglisharrow-up1·2 年前Both should be possible. I am using the psuedo 2FA method. First I type the PIN and after that I confirm with YubiKey.
It is, I have it set up on my laptop. It’s a bit finicky in how it works and it’s not easy to setup, but it is possible.
Does it work by emulating the keyboard and typing in the password? Or by the encrypted protocol that works using the on device secret?
Both should be possible. I am using the psuedo 2FA method. First I type the PIN and after that I confirm with YubiKey.