

If authorized by the school IT department and policy, yes. Ask them, not us.
If authorized by the school IT department and policy, yes. Ask them, not us.
KeePassXC. We have an enterprise secret management product, but I don’t think we’re using this functionality yet.
I would just download them. Already ripped, encoded, and compressed.
For up to 16 endpoints or something like that, yes.
I don’t put it on the Internet.
I have automatic updates enabled and once in a while I scan with Nessus. Also I have backups. Stuff dying or me breaking it is a much greater risk than getting hacked.
Are you short on disk space? Personally I’d just buy enough storage that I don’t even need to care
Well you probably won’t instantly get your door kicked in, but I wouldn’t torrent on someone else’s connection.
What would you even need to download in that time anyway?
Usually they announce arrests. I’m guessing he fucked off back to China before they could pick him up.
If there’s malware on your system, when you can read it, the malware can read it.
What laptop? BIOS option?
I don’t think static linking is that difficult. But for sure it’s discouraged, because I can’t easily replace a statically-linked library, in case of vulnerabilities, for example.
You can always bundle the dynamic libs in your package and put the whole thing under /opt, if you don’t play well with others.
You assume there is no vulnerability in the web server itself, or a vulnerability that allows bypassing authentication.
What’s in the radarr log? You have your downloader configured, enabled, and tested I assume?
It depends on how they’re blocking you. Personally, I’d just let it run through whatever limit until all the files are downloaded.
A full desktop with touchscreen costs money for extra hardware, and developer salary to port and test the software. Selling more specialized devices means you can use less powerful hardware, an embedded(ish) OS like Android, and only run your one program. That’s why the thing you’re looking for doesn’t exist, it just doesn’t make sense as a product outside your one very specific use case.
Okay, those devices are an entirely different category. If your goal is a full desktop environment, though, that’s completely the wrong thing to look at. They don’t have desktop input controls. The most widely supported device would probably be a Steam Deck or similar.
But, if your threat model is "being searched’, it depends on who is doing the searching. NSA? They’re going to pick you apart lest they have another Snowden. Immigration/customs? They’re going to ask you to turn it on and show it’s just a game console.
What are the crazy historical reasons? As far as I know, running six ttys and one graphical session, in that order, has been standard.
The really crazy historical way to test for crashes is num/scroll/caps lock. That’s handled by a very low-level kernel driver. If those are responsive, it’s probably just your display (gpu, X, wayland, or something) that’s locked up. If they’re unresponsive, your kernel is locked up. (If you’re lucky, it’s just gotten real busy and might catch up in a minute, but I’ve only seen that happen once.)
Anything that might interfere with sleep. Literally any attached device might have a buggy driver.
I don’t see a list of hardware in your edit.
As in they’ve grafted all three into one? Neat!