I want to insert my own logo into the boot process, and I want these ducking vendors to properly validate and assess their mother ducking software. But nooo, penetration tests and any remediations are too expensive for these pieces of bit. Why do it when you can just stick your dick in everyone’s face, right?
Your post triggered really bad feelings in me (not your fault) since my last ex got into a really bad episode and just kinda… Forgot about me. That was fun :D
Just as much as CEOs (or any C-levels) deserve an exorbitant amount of pay for their ingenuity of sitting in meetings all day and basing decisions on pretty graphs made by others? Oh, and when the company “doesn’t do well” it’s the employees’ fault! Another round of layoffs WHOOO!
Proton Mail, the leading privacy-focused email service, is making its first foray into blockchain technology with Key Transparency, which will allow users to verify email addresses. From a report: In an interview with Fortune, CEO and founder Andy Yen made clear that although the new feature uses blockchain, the key technology...
Is it shallow, or petty, to decide based on name alone? Yeah, pretty much, but there’s probably something, a product or service or site, that the name has made you gloss right over it or jump to it ASAP....
You need like two tablespoons of yoghurt per liter of milk. Just cook the milk beforehand and let it cool to about 45°C. Mix in the yoghurt and put it in an oven with the light on for a few hours. Voilà!
Good luck with that! It’s basically just playing around with memory and some constructs inside it. The kernel docs for Linux suck balls though if you have no idea about that stuff and/or are new to kernel-level programming. That’s where I learned to love the Microsoft documentation.
You can do the exact same thing in Windows, just think of the SysInternals Suite and its power. It’s just that people on Linux expect problems, while the overwhelming majority of people on Windows/MacOS is using their device expecting it to work and if it doesn’t they go do something else or buy another device.
Also this completely untrue notion that you cannot fix Windows or play around with its internals is very prevalent, to the point that it’s a meme, so people don’t even try.
Okay and now let’s get into threat modelling and risk management.
What is the purpose of a password manager? What are the possible threats against them, and what are those against singular passwords for services? What is the risk of each of those?
Password managers really are not hard to use. Also there’s stuff like the password manager built into iOS, for example, which you don’t even have to think about.
My comment about threat modelling was that you do not seem to understand the purpose of password managers. A way bigger problem for the average person online is password reuse, not targeted attacks against password vaults. That is the problem they solve.
Bastards. SHARE YOUR TECHNOLOGY (lemmy.world)
What's your current favorite distro that isn't Arch, Debian or Fedora?
I’m wondering what the current favorite distros are besides the most popular ones like Arch, Debian and Fedora.
I bet Rockstar is thinking twice about *checks notes* making a normal looking female character. (lemmy.world)
Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack (arstechnica.com)
An open-source, cross-platform terminal for seamless workflows (waveterm.dev)
Render anything inline. Save sessions and history. Powered by open web standards....
In it I'm actually successful and likable (startrek.website)
Totally unrealistic
A question about secure chats (sopuli.xyz)
Two questions....
Help what do I do next (lemmy.world)
Drinking in your 20s vs 30s [Sarah Anderson] (startrek.website)
Shit job (lemmy.zip)
A good deal of IT work, too (lemmy.world)
Text editor war (lemmy.ml)
Low quality meme
Proton Mail CEO Calls New Address Verification Feature 'Blockchain in a Very Pure Form' (tech.slashdot.org)
Proton Mail, the leading privacy-focused email service, is making its first foray into blockchain technology with Key Transparency, which will allow users to verify email addresses. From a report: In an interview with Fortune, CEO and founder Andy Yen made clear that although the new feature uses blockchain, the key technology...
Which things have you avoided or embraced on the name alone?
Is it shallow, or petty, to decide based on name alone? Yeah, pretty much, but there’s probably something, a product or service or site, that the name has made you gloss right over it or jump to it ASAP....
deleted_by_author
Gamedev and linux (treebrary.pone.social)
Source: reddit.com/…/despite_having_just_58_sales_over_38…
Add-on: same password, same identity. (lemmy.world)
Tech workers - what did your IT Security team do that made your life hell and had no practical benefit?
One chestnut from my history in lottery game development:...
Minimalists (reddthat.com)
Well I feel better now. (lemmy.world)