## 20.04 – Getting Ubuntu to do nothing when laptop lid is closed

My cat likes to chew on my laptop’s keys whenever I leave the room. Closing the laptop prevents this problem, but it logs me out and its a pain to log back in, especially when background tasks are running etc.

This is my `/etc/systemd/logind.conf` file where I’ve set all the lid switch stuff to ignore:

``````#  This file is part of systemd.
#
#  systemd is free software; you can redistribute it and/or modify it
#  the Free Software Foundation; either version 2.1 of the License, or
#  (at your option) any later version.
#
# Entries in this file show the compile time defaults.
# You can change settings by editing this file.
# Defaults can be restored by simply deleting this file.
#

#NAutoVTs=6
#ReserveVT=6
#KillUserProcesses=no
#KillOnlyUsers=
#KillExcludeUsers=root
#InhibitDelayMaxSec=5
#HandlePowerKey=poweroff
#HandleSuspendKey=suspend
#HandleHibernateKey=hibernate
HandleLidSwitch=ignore
HandleLidSwitchExternalPower=ignore
HandleLidSwitchDocked=ignore
#PowerKeyIgnoreInhibited=no
#SuspendKeyIgnoreInhibited=no
#HibernateKeyIgnoreInhibited=no
#LidSwitchIgnoreInhibited=yes
#HoldoffTimeoutSec=30s
#IdleAction=ignore
#IdleActionSec=30min
#RuntimeDirectorySize=10%
#RemoveIPC=yes
#InhibitorsMax=8192
#SessionsMax=8192
``````

I’ve also set `IgnoreLid=true` in `/etc/UPower/UPower.conf`

It seems like my settings do get respected for the first few seconds, but if I walk away for longer, then I still get logged out / suspended. Perhaps this has something to do with the `HoldoffTimeoutSec=30s` setting?

## Upload to Sharepoint without direct access [closed]

I want to upload to our Sharepoint site from a remote desktop server. The RDP doesn’t have a direction connection/access. Can this be done? Is there a workaround people have tried?

## Real estate as proof of ties to home country [closed]

I want to use a landed property as evidence for a UK visa application. The problem I am having is the document was not written in my name but my aunt has handed the building to me because my uncle who supposed to be the owner of the building is late.

## Let T : Vn → W be a linear transformation. Then T is determined by its effect on any basis of Vn. Proof. [closed]

Show the proof. Not the complicated proof.

This is another family picture taken about 1932 in central Europe but where?

## homological algebra – The derived \$infty\$-category of sheaves on a site is closed symmetric monoidal

Let $$X$$ be a quasicompact semiseparated scheme. I am trying to recover the (closed) symmetric monoidal structure on $$mathcal{D}(mathrm{QCoh}(X))$$, the derived $$infty$$-category of quasicoherent sheaves on $$X$$. As such I would like to use the flat model structure on $$mathrm{Ch}(mathrm{QCoh}(X))$$ from Gillespie’s Kaplansky classes and derived categories and conclude with Lurie, Higher algebra, 4.1.7.6 and 4.1.7.10., which say that the underlying $$infty$$-category of a simplicial symmetric monoidal model category is symmetric monoidal. But, as far as I understand $$mathrm{Ch}(mathrm{QCoh}(X))$$ is not simplicial. Is there a way to recover the result ? I would be more interested in references which I could cite.

In the case of $$X=mathrm{Spec}(R)$$ with $$R$$ a commutative ring, there might be a workaround going as : $$mathcal{D}(R)$$ identifies with the $$infty$$-category of $$HR$$-module spectra so is symmetric monoidal because the $$infty$$-category of spectra is ; but I must admit that this sort of argument is too advanced for me, and I have yet to hunt for precise references of those statements. Similarly I thik section 2 of Lurie’s Derived algebraic geometry VII should do the trick in general. The main problem I have with that reference is that I don’t understand if it does correctly specialize to my case.

## External battery pack for Speedlight YN600EX-RT II [closed]

As from title I need an external battery-pack that can power the Yongnuo flash YN600EX-RT II. Can anyone suggest me some product?

## ubuntu – SSHClient staying open after server closed connection

I have a bash script that connects via ssh to a server, sudo’s to a different user, backs up a postgresql db then copies the backup to a new name.

The problem is on a large database (this one is around 5 GB) the ssh client will stay active until some (TCP I’m guessing) timeout forces it to close and I get a `client_loop: send disconnect: Broken pipe` message in the log for the script. Smaller databases work fine, and running the same ssh command from another client to the same server has the same issue. The backup appears to work and takes about 7 minutes to complete. The copy also seems to work correctly and not having the copy in the command makes no difference to the symptoms.
The server debug logs show `Read error from remote host x.x.x.x: Connection reset by peer`.

The command we use is :

``````ssh -pxxx -n \$servers " (sudo su postgres -c '"pg_dump -w -F custom -b -E UTF8 -f /opt/pgdumps/\${DB}_last.backup \$DB"' && " sudo cp -p /opt/pgdumps/\${DB}_last.backup /opt/pgdumps/\${DB}_\$(date +%Y%m%d_%H%M%S).backup ") "
``````

Server is Ubuntu 16.04.6; Client is Ubuntu 20.04.1.

Thank you all for your help.

## Is 8 a closed graph? [migrated]

As i say,is the number 8 a closed graph? And there are still a lot graphs partial the same feature.So,i just want to make clear the exact define of closed graph.

## Looking for recommendations for my Personal [closed]

I’m fallen deep into what I see as The Rabbit Hole of the tech world/technology. I started having very odd things happening with my phone & laptop a year ago. I won’t go into too much detail in this post because as I said… it becomes A Rabbit Hole for me.
I’ve yes, tried googling many, many questions I have and in some cases it’s helped. But in most cases, it leads to another.. but more out of just utter confusion that I need clarification on. My own partner is IN I.T yet will barely help answer even one question a week from me.

I have plenty of screenshot pics of things that are confusing to me or look “off”. I get the feeling I’m being remotely watched and files, pics who knows what really, are being transferred… or maybe just spied on.

I’ve lost files, contacts, pictures etc. I believe my network info has been changed(?) revised (?) new router maybe, an Azure account on network.. yet when discussing with my I.T partner who controls all this.. nothing is explained all just denied. No questions answered nada. I find myself digging around and I could potentially I’m sure muck things up worse for myself in the long run.

I’ve supposedly killed my whole wifi connect (even having the option to connect is what I mean) simply by deleting a thunderbolt bridge I never used in settings, Bluetooth pan (that I’ve never seen, didn’t know about etc)
Also my phone gets random photos (very obviously not mine) that will show up in my album, contacts I’ve never heard of nor know pop up…
I assume maybe if files are being transferred, this might be when it’s done by mistake.

I probably just sound like a ranting non/I.T person, “go to school to learn you might say”. I get that.. I’m just hoping to have maybe even just two solid answers pointing me in a direction.

Doing it myself has yes, taught me some inner workings, however, it’s also taken me a year to even get here. I’ve talked to Apple twice, both times they believed malware but didn’t have the time to go through my notes/pics.

I just want to track this down and pinpoint IT

Is there a company anyone might recommend? Or along those lines?