astray

@astray@lemm.ee
0 Post – 20 Comments
Joined 11 months ago

Use root to create new user, then run app as new user.

3 more...

I think what you’re looking for is called a scholarship.

What about GLONASS, Galilleo, or BDS? Are they all being equally jammed? Why wouldn’t they sync with all of them and use a consensus to determine accuracy? Like having multiple ntp servers.

Anything Cisco that says FE is 10/100mbit.

Google trough the Chrome Project are pushing certificate authorities to offer automated certificates services to customers to make their use more prolific. Certificate authorities only have value if they are included in the certificate store, so they will do whatever it takes to be in there. Certificate authorities are the organizations we trust to say if a website is secure enough to display the lock in the browser instead of an error.

2 more...

Or the crack was an in-house job and they are just using the in-house patch to get around it.

Flatpacks include the dependencies with the application. So different flatpacks may have the same libraries over and over, wasting space. RPM/DEB install just the application and each dependency is a separate package, and packages that use the same dependency will share the one copy. So flatpack is better for consistency when running the app because everyone is running the same dependency version, and space isn’t as much of an issue anymore with nearly everything having more than enough storage.

The best part is the lack of what the task was in the end. So true.

I wish Elon would scare away Reddit’s advertisers instead of twitter’s.

Reddit is just like Digg to me now.

A security module or a key fob/smart card processes the key internally using its own dedicated ram and cpu without any debugging support. This way, even something will full ram and cpu access or a compromise of your machine, there is no way to export or access the key. Data is passed to the module and it returns the scrambled or unscrambled result based on the key which no body knows or has ever seen. A key locked with no way to access can’t be hacked without physically stealing the module, which is where your pin comes in to save you. The TPM is a very important part of a secure boot chain. If you want to secure other things I wouldn’t blame you for using a separate module or fob that isn’t always connected util it’s actually needed and it should only be activated with a physical button or something so you have to be present to engage with it. This adds even more security. So you could use the TPM for boot chain security and a separate fob or data privacy for example.

You over estimate my ms painting abilities. That star would take me ages.

You’d have to pay me to look the other way and ignore security too.

And he’ll certainly have all his bail prearranged so he will show up and go home afterwards. I don’t see why they act like these people are actually being arrested or will actually even see bars.

Have you tried iPhoto with Advanced Protection enabled?

Or you could use a separate key on each device.

What about how close everything was built? Couldn’t some of the blame be on the city planners or enforcers?

Dr Pepper.

Why does the game mod have this much access?

I’m not trained in anything useful but I had a similar experience. It was like upgrading from a 720 screen to a 4k screen.