alsdkfjkqjwer | 5 years ago | on: Forget credit cards – now you can pay with your face. Creepy or cool?
alsdkfjkqjwer's comments
alsdkfjkqjwer | 5 years ago | on: I Tried to Live Without the Tech Giants. It Was Impossible
That is a very creative way to describe forcing one-side standards via monopolies. By your logic, you also love IE4, HTTPxml, flashcookies, etc.
And you call microsoft business tactics in the 90s as "foresight, wisdom, excellence, responsibility and stewardship" because that is the text book those companies are following to push those "technologies" that are completely self-serving to show rich ads to you and control which video your browser can play or not.
alsdkfjkqjwer | 5 years ago | on: Show HN: Photo Realistic QR-Codes
If you display a QR Code with some url, and fail to show a shortened url next to it for people to type instead of scanning, you either fail basic common sense tests, or are intentionally being an asshat.
alsdkfjkqjwer | 5 years ago | on: Amazon satellites add to astronomers' worries about night sky
So, i guess it is as legal as the interference themselves will cause on your 5g phone reception.
alsdkfjkqjwer | 5 years ago | on: Amazon satellites add to astronomers' worries about night sky
This is about spending a few dollars more to have them properly painted.
Think about this, Musk and Bezos are saving a few cents. In exchange of astronomy.
alsdkfjkqjwer | 5 years ago | on: Linux Malware “Drovorub” developed by Russian exposed by NSA and FBI
NOTE: The mitigations that follow are not meant to protect against the initial access vector. The mitigations are designed to prevent Drovorub’s persistence and hiding technique only.
Apply Linux Updates
System administrators should continually check for and run the latest version of vendor-supplied software for computer systems in order to take advantage of software advancements and the latest security detection and mitigation safeguards (National Security Agency, 2018). System administrators should update to Linux Kernel 3.7 or later in order to take full advantage of kernel signing enforcement.
Prevent Untrusted Kernel Modules
System owners are advised to configure systems to load only modules with a valid digital signature making it more difficult for an actor to introduce a malicious kernel module into the system. An adversary could use a malicious kernel module to control the system, hide, or persist across reboots (National Security Agency, 2017).
Activating UEFI Secure Boot is necessary to ensure that only signed kernel modules can be loaded. This requires a UEFI-compliant platform configured in UEFI native mode (not legacy or compatibility modes) in Thorough or Full enforcement mode. Once enabled, Secure Boot creates an integrity chain at boot by verifying signatures of firmware, bootloader(s), and Machine Owner Key (MOK). The kernel, initial filesystem, and kernel modules are then verified by this MOK, which is distributed with Secure Boot-ready Linux distributions. Components with untrusted or absent signatures are denied from execution by Secure Boot policy. Enabling Secure Boot may prevent some products from loading, potentially affecting system functionality, and may require custom configuration (National Security Agency, 2017). </quote>
alsdkfjkqjwer | 5 years ago | on: Why Write ADRs
alsdkfjkqjwer | 5 years ago | on: Stopping phishing campaigns with Bash
all attempts got responses like "cool, but we don't do any of that. please contact google safe-site(tm) beta or something and get it blocked on the browser via that".
Everyone here posting that they replied probably used email from a domain that is an expensive paid customer from them. I used a @gmail one.
alsdkfjkqjwer | 5 years ago | on: Single Page Applications using Rust
alsdkfjkqjwer | 5 years ago | on: Mac keyboard shortcuts
typed "undo close" on that search box. Nothing. clicked on the "tab" menu. still nothing. finally going back to the search box and typing "tab" it shows up as "reopen closed tab" and show me that it is in the "file" menu.
Weird application choices aside, Wonder why apple don't make that a central keyboard first command box like emacs or most code IDEs do. I mean, i don't even know how to go to that help search box without a mouse.
alsdkfjkqjwer | 5 years ago | on: Statue vandal identified thanks to mandatory contact tracing
Collect good-will medical data and then use for whatever purpose you want?
Who cares about some plaster in a tourist theme park?! Not to mention there are already dozen of ways to punish anyone braking things already anyway. They did not have to harm the covid-19 good-will contact tracing efforts for this.
alsdkfjkqjwer | 5 years ago | on: 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions
I understand exposing backdoors and all, but who cares about a camera firmware for a airgaped system?
wonder if some of the clients for those devices is involved and the goal of this is that those clients got fed up with the NDAs and wanted all this in "public domain"?