

They are hardly even in the US market. Only via Murena with their e/OS/.
They are hardly even in the US market. Only via Murena with their e/OS/.
Those are both way more useful than exploiting a lazy coder’s fuckup
I never said social engineering, physical breaching, exerting force on people, and other ways of compromising systems weren’t useful. They just aren’t hacking to me, otherwise the term is too broad to be very useful.
You’re free to come up with your own definition, I was asked to define it and that’s my best shot for now.
You know my first instinct wast to reply with: “No.”
Maybe I should have stuck with that. I had a feeling this would lead nowhere.
I’d start with the following, and refine if necessary:
“Gaining unauthorized access to a protected computer resource by technical means.”
* Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
** The governor and his idiot troupe eventually stopped their grandstanding and didn’t file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily
I haven’t heard of a firewall failing open when overwhelmed yet. Usually quite the opposite, a flood disables access to more than just the targeted device, when the state table overflows.
But maybe there is a different mechanism I’m not aware of. How would the DDoS change the properties of ingress?
DDoS is not hacking
They do actually burn gas locally, I wasn’t trying to dispute that part. It has become a political discussion in Memphis. Apparently they wanted to start operations on turbines before the grid access was ready.
The linked video is a bit unclear to me. The don’t explain the modes well. Mostly it seems to just show heat. According to the description it’s a Teledyne FLIR G620, which should be able to detect Methane and other VOCs. But it’s not clear to me how we are supposed to distinguish hot rising CO2 and H2O from any potentially leaking Methane, in those pictures.
Video in question https://www.youtube.com/watch?v=4prazMVylRs
Oh, my condolences. I used to have to rely on Powerline too.
I use a 10Mb LAN connection to my Giagabit router
Is that a 10BASE-T connect over two pairs of twisted pair? But even then you’d naively expect Fast Ethernet 100 Mb/s at least. I’m curious what it’s only 10, can you tell us?
In my experience that’s usually the case for XG-PON and XGS-PON networks. Because you’re sharing one port on the OLT with up to 63 neighbours. Though I think most build outs aim for 16 or 32 splits.
Anyway they don’t want to risk you sending when it’s not your turn or disturbing your neighbours connection in any other way, they make you use their ONU. Basically the same old story like with the coax cable modems. Just because some idiot (or rather industry group of idiots) had to go and turn fiber back into a shared medium to save on cable and ports a bit.
Where am I supposed to get a 10Gb modem for residential use?
There are a few routers that have SFP+ slots so you can modulate to any laser signal your provider might require.
Otherwise if you’re looking for strictly only a modem there are various available. They are usually simply called fiber to ethernet converter. Startek, Delock, Trendnet, FS
If you meant a switch, well 10G switches are abundant. Zyxel, Netgear, TP-Link all the usual suspects.
Yep. Relevant sentence bolded by me below
6d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements.
violated the terms of the GPL
Well we don’t know that, the terms say that you need to make the source available to people who got the binary. Either ship them together or ship a written offer for obtaining the source with the binary. You do not have to make the source available to the public (but any of your customers later could).
To verify your claim we would have to get the binary from them, and check if source or an offer for it was included.
Edit: The above is true for GPL2, but it seems Signal is under GPL3, in which distribution of offers of source have been curtailed a bit compared to GPL2, if I’m reading Section 6 here right
For me things actually became easier when I got myself a native Linux install instead of Windows. But I guess it depends on your college.
Ah but then they can’t buy them, since they already spent their human rights on lavish royal lifestyles.
The size difference is not significant. This is about the maintenance burden. When you need to change some of the code where CPU architecture specific things happen you always have to consider what to do with the code path or the compiler flags that concern 486 CPUs.
Here is the announcement by the maintainer Ingo Molnar where he lists some of the things he can now remove and stop worrying about: https://lore.kernel.org/lkml/20250425084216.3913608-1-mingo@kernel.org/
Yeah I’d second that. It’s good for discovering valid settings as you get start, and then once you want to do more complicated stuff, the XML option view becomes useful, and then if you want to try on CLI after all you can start using virsh to administer the same VMs.
At least that’s how I progressed through the stages as I started messing with a Windows VM for a game that doesn’t lend itself to hosting on Linux natively.
giving out my IP to trusted friends
Just in case you ever get back into it: We regularly see scanners scanning the internet with a million packets per second at work these days. That means it takes them 4000 seconds to scan the entire IPv4 Internet to check who responds on port 3784. So handing out the IP selectively won’t be enough.
I also learned that the hard way privately with my Minecraft server. It was found in a scan and listed on Shodan at some point, and I hadn’t put up a whitelist. Some shitty kids came and destroyed whatever they could find before finally putting up signs to mock me lol
I wonder how betrayed the people in the Appalachian feel when their supposed “own” Vance stood for this.