on each device i have a bookmarks folder like “ARCHIVE” or “stuff”, so these whimsy bookmarks don’t interfere with my actual bookmarks i need for work, games, shopping, etc. 😅
dim indirect light from behind the screen is best IMO and that’s also enough to find that rare key, as well as your drink without knocking it over and causing havoc.
There are sites that respect the “do not track” setting of the browser and just display a small timed info on your first visit that cookies have been rejected. Examples: geizhals.eu , geizhals.de
Even though comments are very helpful, often it’s even enough to name variables and methods/functions really good. At least do that. You don’t want i, j and value. Believe me. You want rowCount, colCount and deliveryOption instead. You just may not know it now, but you will, when it has to be changed in a few months.
Alt text: Michael Scott Handshake meme. Managers text: “My company Congratulating me on avoiding a phishing test email”. Michael Scott text: “Me, terminally behind on answering email.”
There is, but if one gets through, they want us to forward it to this account that will be used to train, fine tune and improve the scanner for all mailboxes, as well as security training for employees.
Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object....
I mean that any attack gets more easy when you know, after it’s decrypted there are the bytes A, B and C at the locations X, Y and Z. It helps with brute force as well as hybrid attacks to find the master key.
LUKS does exactly have those specific Bytes at specific locations PLUS it has a marker that basically says “I am in this format and encrypted with this algorythm”.
A good pasphrase helps the same for non-LUKS, but they still don’t have that specific weakness.
You can use cryptsetup without LUKS. However, something that starts to decrypt has to be unencryoted, so you can enter the password. Depending on how convenient it is for the user, it will leak some helpful info, like for example that the target is a valid file system that can be mounted or what cipher had been used.
to conceal this, you’d have to enter all it does manually in a shell/script without history. You could also add a number of bytes to skip as a sort of extra password and fill the start with random bytes, so it’s harder to find the start of the payload that is peobably a file system.
Quarter was rejected at the laundrymat. Someone slipped me a token for a lazer tag franchise that went bankrupt in 1997 (lemmy.world)
Sentient vacuum cleaners? (lemmus.org)
Haircut Practice by Adam Koford for January 22, 2024
Bookmarks (lemmy.zip)
Are you a "Reply after 6 minutes person" or a "Reply after 16 hours person"? (lemmy.blahaj.zone)
Source
ifn't (programming.dev)
Just got my new favorite needle minder! (lemmy.world)
I liked it so much I actually got 2 of them lol
The Perfect Solution (programming.dev)
Why would I need backlit keys anyway? (lemmy.ml)
Came up with this late at night. Not while being anywhere near a laptop though.
Don't think my phone runs Nvidia... or Wayland 🤔 (sh.itjust.works)
Reddit must share IP addresses of piracy-discussing users, film studios say (arstechnica.com)
One of the most annoying things on the Internet (lemmy.world)
Hey, have you ever heard of Pop!_OS? (civilloquy.com)
Pudding used to come in cans (lemmy.world)
deleted_by_moderator
Rare uttar pradesh good news :Lesbian Couple From Bengal Marries At UP Temple (www.ndtv.com)
In case of emergency, open crisps bag (lemmy.world)
Source: …tumblr.com/…/no-crisps-only-toby-this-is-a-redra…
I use a WM btw (lemmy.world)
When you forget to set a boundary conditions in your logic (programming.dev)
915 days a year 😂...
Revisiting code I wrote last year (lemmy.world)
New email from test@scam.com (lemmy.blahaj.zone)
Alt text: Michael Scott Handshake meme. Managers text: “My company Congratulating me on avoiding a phishing test email”. Michael Scott text: “Me, terminally behind on answering email.”
deleted_by_author
How to luks encrypt raid drive?
Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object....