- 0 Posts
- 291 Comments
Kazumara@discuss.tchncs.deto Europe@feddit.org•Hungary is now the poorest nation in EUEnglish15·5 days agoThat Economic Times article cites a Kyiv Insider article, but doesn’t link it, which I consider terrible journalism.
Here’s the link: https://kyivinsider.com/orbans-hungary-is-now-officially-the-poorest-nation-in-the-eu/
Kazumara@discuss.tchncs.deto Technology@lemmy.world•Trump's Corrupt Plan to Steal Rural America's Broadband FutureEnglish1·8 days agoI wonder how betrayed the people in the Appalachian feel when their supposed “own” Vance stood for this.
Kazumara@discuss.tchncs.deto Technology@lemmy.world•Fairphone announces the €599 Fairphone 6, with a 6.31" 120Hz LTPO OLED display, a Snapdragon 7s Gen 3 chip, and enhanced modularity with 12 swappable partsEnglish2·9 days agoThey are hardly even in the US market. Only via Murena with their e/OS/.
Kazumara@discuss.tchncs.deto Technology@lemmy.world•Trump social media site brought down by Iran hackersEnglish1·9 days agoThose are both way more useful than exploiting a lazy coder’s fuckup
I never said social engineering, physical breaching, exerting force on people, and other ways of compromising systems weren’t useful. They just aren’t hacking to me, otherwise the term is too broad to be very useful.
You’re free to come up with your own definition, I was asked to define it and that’s my best shot for now.
Kazumara@discuss.tchncs.deto Technology@lemmy.world•Trump social media site brought down by Iran hackersEnglish2·9 days agoYou know my first instinct wast to reply with: “No.”
Maybe I should have stuck with that. I had a feeling this would lead nowhere.
Kazumara@discuss.tchncs.deto Technology@lemmy.world•Trump social media site brought down by Iran hackersEnglish92·10 days agoI’d start with the following, and refine if necessary:
“Gaining unauthorized access to a protected computer resource by technical means.”
- Port scanning --> Not hacking because there isn’t any access to resources gained*
- Using default passwords that weren’t changed --> Not hacking because the resource wasn’t protected*
- Sending spam --> Not hacking because there isn’t any access to resources gained
- Beating the admin with a wrench until he tells you the key --> Not hacking because it’s not by technical means.
- Accessing teacher SSN’s published on the state website in the HTML --> Not hacking because the resource wasn’t protected, and on the contrary was actively published**
- Distributed denial of service attack --> Not hacking because there isn’t any access to resources gained
* Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
** The governor and his idiot troupe eventually stopped their grandstanding and didn’t file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily
Kazumara@discuss.tchncs.deto Technology@lemmy.world•Trump social media site brought down by Iran hackersEnglish2·10 days agoI haven’t heard of a firewall failing open when overwhelmed yet. Usually quite the opposite, a flood disables access to more than just the targeted device, when the state table overflows.
But maybe there is a different mechanism I’m not aware of. How would the DDoS change the properties of ingress?
Kazumara@discuss.tchncs.deto Technology@lemmy.world•Trump social media site brought down by Iran hackersEnglish1057·11 days agoDDoS is not hacking
Kazumara@discuss.tchncs.deto Technology@lemmy.world•xAI Data Center Emits Plumes of Pollution, New Video ShowsEnglish8·18 days agoThey do actually burn gas locally, I wasn’t trying to dispute that part. It has become a political discussion in Memphis. Apparently they wanted to start operations on turbines before the grid access was ready.
Kazumara@discuss.tchncs.deto Technology@lemmy.world•xAI Data Center Emits Plumes of Pollution, New Video ShowsEnglish631·20 days agoThe linked video is a bit unclear to me. The don’t explain the modes well. Mostly it seems to just show heat. According to the description it’s a Teledyne FLIR G620, which should be able to detect Methane and other VOCs. But it’s not clear to me how we are supposed to distinguish hot rising CO2 and H2O from any potentially leaking Methane, in those pictures.
Video in question https://www.youtube.com/watch?v=4prazMVylRs
Kazumara@discuss.tchncs.deto Programmer Humor@programming.dev•Ramsay's kitchen nightmares, but for software development9·20 days agoThis week I heard from a network group lead of a university hospital, that they have a similar issue. Some medical devices that come with control computers can’t be upgraded, because they were only certified for medical use with the specific software they came with.
They just isolate those devices as much as possible on the network, not much else to do, when there is no official support and recertification for upgrading. And of course nobody wants to spend half a million on a new imaging device when the old one is still fine except for the OS of the control computer.
Sounds like a shitty place to be, I pity those guys.
That said, if you were talking about normal client computers then it’s inexcusable.
Kazumara@discuss.tchncs.deto Europe@feddit.org•Swiss manufacturing ‘contributes to Russian war machine’English3·24 days agoThat article is kind of shitty. I’d propose that reading the original with the help of machine translation is probably still better: https://www.srf.ch/news/international/trotz-sanktionen-schweizer-maschinen-in-russlands-waffenfabriken
Also just FYI this is 3 months old, that’s why the article refers to Trump stopping weapons deliveries, that was a current development at the beginning of march.
Kazumara@discuss.tchncs.deto Ask Lemmy@lemmy.world•What are some creative ways to use an unused telephone jack outlet?2·28 days agothough you’d need to supply power
Go for really old ones with the crank handle for ringing. Like from army surplus and you don’t need the power :-)
We played around with these for a day in the army https://en.wikipedia.org/wiki/Feldtelefon_50 when you crank the handle while your friend is still putting down the line you can shock them.
Pre-UEFI they were fighting over the boot sector, sure, but now that everything is more well defined, and every OS can read the FAT32 ESP? Never seen it…
At worst the UEFI boot entry is replaced. There are some really shitty UEFI implementations out there which only want to load
\efi\microsoft\boot\bootx64.efi
or\efi\boot\bootx64.efi
, or keep resetting you back to those.Assuming you were dumped into Windows suddenly, you can check if you have the necessary boot entries still with bcdedit and its firmware option
bcdedit /enum firmware
If you just have a broken order you can fix it with
bcdedit /set {fwbootmgr} displayorder {<GUID>} /addfirst
If you actually need a new entry for Linux it’s a bit more annyoing, you need to copy one of the windows entries, and then modify it.
bcdedit /copy {<GUID1>} /d "Fedora" bcdedit /set {<GUID2>} path \EFI\FEDORA\SHIM.EFI bcdedit /set {fwbootmgr} displayorder {<GUID2>} /addfirst
Where GUID1 is a suitable entry from windows, and GUID2 is the one you get back from the copy command as the identifier of the new entry. Of course you will have to adjust the description and the path according to your distro and where it puts its shim, or the grub efi, depending on which you’d like to start.
Edit: Using DiskGenius might be a little more comfortable.
Kazumara@discuss.tchncs.deto Ask Lemmy@lemmy.world•Have your parents ever said something so unhinged that you’re just left standing there like🧍♂️?30·1 month agoI am not a computer science major, I studied linguistics.
We’re not falling for your deceit, Noam Chomsky. You probably used some context-free grammar to hack the website.
lol, the “j l’ai lu” domain is pretty funny
Kazumara@discuss.tchncs.deto Technology@lemmy.world•Realtek's $10 tiny 10GbE network adapter is coming to motherboards later this yearEnglish1·1 month agoOh, my condolences. I used to have to rely on Powerline too.
Kazumara@discuss.tchncs.deto Technology@lemmy.world•Realtek's $10 tiny 10GbE network adapter is coming to motherboards later this yearEnglish11·1 month agoI use a 10Mb LAN connection to my Giagabit router
Is that a 10BASE-T connect over two pairs of twisted pair? But even then you’d naively expect Fast Ethernet 100 Mb/s at least. I’m curious what it’s only 10, can you tell us?
Why 80 hours? Is that a threshold that has taken on a specific meaning in the US political discord? Otherwise it seems a little random, that’s like a 50% employment, right?