

What problems with owning the hardware did you face?
I have one and have changed various configurations - it’s now mostly just a DSL passthrough device at the moment, but I haven’t noticed any restrictions…


What problems with owning the hardware did you face?
I have one and have changed various configurations - it’s now mostly just a DSL passthrough device at the moment, but I haven’t noticed any restrictions…


Companies should tie CISO contracts to ransomware payouts.
We’d instantly have better protection AND make it financially unviable for future attacks as the CISO’s would have to pay out from their own wages.


We had a guy at work that was emailed some personal data by accident from HR.
He questioned what it was about and HR asked him to send the data back to them.
People in important roles just don’t understand techology.
(Yes, of course we cracked the password and opened it)


Thanks for posting @[email protected], that aeticle was more interesting & thought invoking than I thought it would be.
I’m using XFCE with a theme that feels like it’s from the 90’s and thinking about it, it does feel better to use than all the modern craziness that Microsoft has been doing in the last few years. I hated the Metro era…


This is a really good point.
Remember that Microsoft has patch Tuesday… so… it’s now just normal mundane patching. No sensationalism, no logos, no catchy names.
But we don’t know what’s going on in there.
Linux is now getting more news because more people are hammering it with AI, but we should hear that each item is being fixed and / or worked around with open discussions.


Well… if all the AI companies are making massive losses, might as well take some of their money from them and help them along.


Lots of work coming my way then…


I don’t see any mention of tracking applications, so they’re just monetizing the data from the carriers?


how did we go from cash […] to credit cards Consumerism convenience, that’s all.
If the vast majority of people saw value in cash (or privacy), there wouldn’t be as much adoption of cards (or the subject matter: phone payments)


Have a look on the Arch Linux wiki around udev and event debugging (evdev?)
Depending on whether you’re suspending to RAM or disk will affect the time it takes - and of course, how much stuff it has to suspend.
If you’re in the middle of a resource intensive task (which could just be watching a video… all depends…), then whatever is running needs to stop, and possibly has a full buffer which needs processing as suspend could be to the swap file / partition, which may need emptying first.
But, it should all work these days.


Top Tip: open another terminal and kill the task from there
( /s )


Just echo text to create a new file or use sed and awk to edit an existing file.
In reality, I use nano for edits and vimdiff for comparing files (usually a .pacnew after an update on a headless device)


Adding to what the others have said, if save your passwords in a password manager application (I’ll volunteer KeePass…), then you’re effectively doing a similar thing, but you can take the passwords with you to other devices.
So, I disable the browser’s option to save passwords (which avoids a potential security vulnerability) and use KeePass.
But, I’m working on 2~3 laptops and a phone, so losing the convenience of the browser autopopulating authentication fields is mitigated by having my passwords on multiple devices.


Not to mention this one: https://xkcd.com/538


Maybe point the program to the post here and they might release everyone from that condition…?


Do you know where the unit has to connect to?
Maybe a firewall which only permits the inverter to talk to the platform is good enough protection?
And, do you know the protocol? Ie MQTT? Modbus? You might be able to limit that too…


Hmmm.
I have an issue with my media PC where if it’s turned on before the HDMI connected TV, then we can’t see the display… I wonder if this will fix that issue too by pretending the TV is always connected…


Hmmm.
We use this at work, so have open access for the team. Just checked and my work’s email isn’t in there, so I’m presuming we’re safe… not sure about whoever pays the bill though.


Is this a specific PC, or a general question?
All spyware needs to get the info to the spy somehow, so as others have said, it’s probably best to watch the network traffic.
But also - not so much for home, more for an office - look out for keyloggers and weird physical devices attached to the PC, they can be sending data via other methods.
And prevention is better than cure, get a good antimalware installed - and perhaps something which only allows known good (allow listing), rather than blocking known bad (block listing).
nanofor most editingvimdifffor comparing files (Ie.pacnewfiles)