vk6flab

joined 6 months ago
[–] [email protected] 12 points 2 days ago (2 children)

Is there a place where one could offer suggestions for appropriate natural source materials?

[–] [email protected] 25 points 6 days ago

A Statement From Linda Ronstadt

Sept. II, 2024

San Francisco

Donald Trump is holding a rally on Thursday in a rented hall in my hometown, Tucson. I would prefer to ignore that sad fact. But since the building has my name on it. I need to say something.

It saddens me to see the former President bring his hate show to Tucson, a town with deep Mexican-American roots and a joyful. tolerant spirit.

I don't just deplore his toxic politics, his hatred of women. immigrants and people of color, his criminality, dishonesty and ignorance although there's that.

For me it comes down to this: In Nogales and across the southern border, the Trump Administration systematically ripped apart migrant families seeking asylum. Family separation made orphans of thousands of little children and babies, and brutalized their desperate mothers and fathers. It remains a humanitarian catastrophe that Physicians for Human Rights said met the criteria for torture.

There is no forgiving or forgetting the heartbreak he caused.

Trump first ran for President warning about rapists coming in from Mexico. I'm worried about keeping the rapist out of the White House.

Linda Ronstadt

P.S. to J.D. Vance:

I raised two adopted children in Tucson as a single mom. They are both grown and living in their own houses. I live with a cat. Am I half a childless cat lady because I'm unmarried and didn't give birth to my kids? Call me what you want, but this cat lady will be voting proudly in November for Kamala Harris and Tim Walz.

Link Ronstadt

[–] [email protected] 3 points 1 week ago (2 children)

Some people in Australia absolutely have ideas like you describe, fortuitously the rest of us don't have to vote for them.

[–] [email protected] -2 points 1 week ago

Sounds like Darwinian selection in progress..

[–] [email protected] 14 points 2 weeks ago (9 children)

Australia has compulsory voting with penalties for not voting. It ensures that people who don't think they have a voice or that their vote doesn't change anything actually are required to make their voice heard, even if they think that it doesn't matter.

[–] [email protected] 42 points 2 weeks ago (2 children)

Is it just me who is sceptical about anything new from Intel at the moment?

Mind you, this is not the first time that this feeling has existed, there was a standing joke amongst IT professionals in the mid 1990s that the sticker "Intel Inside" was actually a warning label, referencing the Pentium FDIV bug.

[–] [email protected] 7 points 2 weeks ago (1 children)

Multiple camera angles are used for two reasons:

  1. Added visual interest. People tend to want variety and colour and movement offered by different views can provide that. This is the obvious reason it's being used.
  2. Ability to edit without it being obvious. Often a presenter will require multiple takes to "get it right". If you edit in the take, the picture "jumps" because humans move around. If you have multiple cameras you can edit and switch cameras without it looking like an edit. If you then also look at a different camera when you make a mistake, you can keep recording and fix it when you edit it together.
[–] [email protected] -2 points 2 weeks ago (6 children)

All I'll say is that I'm glad that I'm neither your child, nor a member of your software development team..

[–] [email protected] 2 points 2 weeks ago

I was thinking in terms of human vs shark apex predatory behaviour..

[–] [email protected] 10 points 2 weeks ago (3 children)

There's a joke here about swimming, apex predators, balance of power and Nom Nom Nom, but I'm Too Tired to figure it out.

[–] [email protected] 26 points 2 weeks ago (4 children)

And many of them are heading to BlueSky..

 

Starting yesterday, Connect hard crashes when you attempt to click on the Inbox and the same happens if you click on the notification bell showing that there are messages.

As of this morning, the Inbox sidebar label is coloured Red instead of Blue.

Connect Version 1.0.190 Android v13 with latest security patches

 

How are you storing passwords and 2FA keys that proliferate across every conceivable online service these days?

What made you choose that solution and have you considered what would happen in life altering situations like, hardware failure, theft, fire, divorce, death?

If you're using an online solution, has it been hacked and how did that impact you?

 

I've been using VMware for about two decades. I'm moving elsewhere. KVM appears to be the solution for me.

I cannot discover how a guest display is supposed to work.

On VMware workstation/Fusion the application provides the display interface and puts it into a window on the host. This can be resized to full screen. It's how I've been running my Debian desktop and probably hundreds of other virtual machines (mostly Linux) inside a guest on my MacOS iMac.

If I install Linux or BSD onto the bare metal iMac, how do KVM guests show their screen?

I really don't want to run VNC or RDP inside the guest.

I've been looking for documentation on this but Google search is now so bad that technical documents are completely hidden behind marketing blurbs or LLM generated rubbish.

Anyone?

 

There is a growing trend where organisations are strictly limiting the amount of information that they disclose in relation to a data breach. Linked is an ongoing example of such a drip feed of PR friendly motherhood statements.

As an ICT professional with 40 years experience, I'm aware that there's a massive gap between disclosing how something was compromised, versus what data was exfiltrated.

For example, the fact that the linked organisation disclosed that their VoIP phone system was affected points to a significant breach, but there is no disclosure in relation to what personal information was affected.

For example, that particular organisation also has the global headquarters of a different organisation in their building, and has, at least in the past, had common office bearers. Was any data in that organisation affected?

My question is this:

What should be disclosed and what might come as a post mortem after systems have been secured restored?

1
submitted 5 months ago* (last edited 5 months ago) by [email protected] to c/[email protected]
 

U2F keys can be purchased online for the price of a cup of coffee. They're being touted as the next best thing in online security authentication.

How do you know that the key that arrives at your doorstep is unique and doesn't produce predictable or known output?

There's plenty of opportunities for this to occur with online repositories with source code and build instructions.

Price of manufacturing is so low that anyone can make a key for a couple of dollars. Sending out the same key to everyone seems like a viable attack vector for anyone who wants to spend some effort into getting access to places protected by a U2F key.

Why, or how, do you trust such a key?

The recent XZ experience shows us that the long game is clearly not an issue for some of this activity.

view more: next ›