Knowing how to sift through the results, and read the good answers for key elements, is a skill. One that you improve with experience.
Knowing how to sift through the results, and read the good answers for key elements, is a skill. One that you improve with experience.
Oh, man, finding registry info was like the Search for the Holy Grail (Monty Python style).
At one time I worked for MS, and was fortunate to stumble on some good tools for it (like an OLE browser, which is originally what the registry was designed for-it was actually called the OLE Registration Database on Win 3.1), and I acquired every resource kit I could find, and pored over them.
Yep.
Rather than try to single-handedly re-engineer an old protocol to be secure, I just use it for stuff where security isn’t a big deal. Including messages with links to secure resources (and send credentials via a separate system).
I don’t see how you wouldn’t have your email on an email providers servers - that’s how email works. You send an email via a provider, they forward it to the destination address you’ve included with the email.
That destination address is another email provider’s server, which holds it until the receiver connects and downloads it. Email is a store-and-forward system, designed at a time when users weren’t always connected. It still works this way.
Email is old, so the fundamental mechanics are pretty simple, and encryption wasn’t an option at the time - so it’s sent in the clear. Otherwise it would require both sender and receiver (either at both ends, or the servers) to agree on an encryption to use.
Haha, nicely done. I had to work harder and harder to read it.
Lol, Play is an exploit.
After 30 years in IT, I’ve seen 100x more systems taken down by updates than by exploits.
Actually, I’ve never had a system taken down by an exploit, 100% of outages have been caused by borked updates or changes.
I’ve had friends who’s clients have been taken hostage by exploits, and 100% of those have been because of poor security practices and phishing - neither of which is preventable by updates.
Here’s a question, if almost no-one sideloads or uses FDroid, where do people get the millions of malicious apps from? Play Store.
So where’s the problem again? Oh, yea, Play Store.
Why does Play need Play Protect if practically all apps come from Play Store?
Nah, then stuff breaks.
At idle, SSD is usually better (like you said if the SSD has proper power management, and that takes research to know).
Spinning platters are generally still better for power per gig/terabyte, because write time they consume less power than SSD.
I dont really look at drive power consumption, because even with ~10 drives running in my environment, a single cpu doing anything moderate blows away their power consumption numbers (I’ve tested, not that it was needed, heat dissipation alone makes it clear).
I have a ten-year old 5 drive NAS that runs 24/7, and it’s barely above room temp. Average draw is a few watts (the number was so low I put it out of my mind, maybe 5 watts - Raspberry Pi territory).
My SFF desktop is 12w at idle, with either 2 small SSDs (500GB each) or a single large drive (12TB). So much for SSD having better idle power.
SSD isn’t necessarily less energy hungry than spinning platter.
It really depends on the specific units and use patterns.
Generally SSD has better idle power, and HD has better read and write power, but that doesn’t even always hold true.
If your device sits idle long enough, SSD is better for power, but the write time to get to idle could easily consume the power differential.
https://www.edn.com/power-vs-energy-ssd-and-hdd-case-studies/
Beat me to it. I always have the page up.
About damn time.
You’re not wrong!
I’m a fan of the martini - when I’m in the mood to drink. But make it gin, a good one like Boodles or some of the new stuff with citrus notes.
Another good shower thought today!
Scans for open ports run continuously these days.
Ten years ago I opened a port for something for a couple days - for months after that I was getting regular scans against that port (and others).
At one point the scans were so constant it was killing my internet performance (poor little consumer router had no defense capability).
I don’t think the scans ever fully stopped until I moved. Whoever has that IP now probably gets specifically scanned on occasion.
And just because you don’t run a business doesn’t mean you have nothing to lose.
DMZ should be enough… But routers have known flaws, so I’d be sure to verify whatever I’m using.
Finally, a real shower thought!
This isn’t a theses defense, so stop with the sophistry.
Divide what?
Lemmy isn’t a monolithic thing, how would that be divided?
Android isn’t Linux, Android is a Java implementation using a Linux kernel (IIRC) - the Linux part isn’t even “complete” - when you root you find there are tools you need to add to get typical Linux capability (busybox, init-d, etc). .
So you’re not going to install an Android APK on Linux or anything else, unless it emulates Android.
The language used doesn’t mean much - lots of stuff for Windows was written using C languages, and those would never run on Linux or Unix.
I guess we’re making up our own definitions these days… 6.3 is now compact?
If I understand you correctly, the developmental changes occurring between releases (every little step change/test) won’t be visible to us, just the final results in the form of the release code? (All corrections/clarifications accepted, hell, requested). We’d still be able to compile, but we wouldn’t necessarily have code for those small, incremental changes.
Some Americans.
Stupidity knows no boundaries.
This guy is as dumb as they come