[-] Bitrot@lemmy.sdf.org 6 points 1 day ago

It seems like the kind of thing the Foundation would run anyway (or sponsor as a separate project), rather than the Corporation being involved at all.

[-] Bitrot@lemmy.sdf.org 1 points 1 day ago

Harder on the corporate side, but this has been an issue in the warehouses.

[-] Bitrot@lemmy.sdf.org 17 points 3 days ago

Encrypt them before they’re ever put there. One example I can think of is in resilio sync, which has the option for sharing a folder to an encrypted peer. Other peers encrypt it before sending anything, that peer doesn’t have the decryption keys at all.

[-] Bitrot@lemmy.sdf.org 1 points 4 days ago

Yeah, I want my passwords unencrypted in the browser, where they belong!

[-] Bitrot@lemmy.sdf.org 3 points 4 days ago

Remainder that Tails is an NSA PRISM targeting keyword. Congrats on making the list, folks!

[-] Bitrot@lemmy.sdf.org 47 points 4 days ago

They are logged, but swatting people get around it. They are suspicious “looking” calls, but so are bomb threats.

Swatting is pretty much always a blocked number to a non-emergency line. If they are traced it is typically one of those free online voip services. It takes work and access to really get from A to B, which is why it only happens when there are awful results.

In the US at least, 911 gets special access and calling it will always get you to your local dispatch (unless you have voip with the wrong account address). Non-emergency is just a normal phone number. If someone wants to call from out of the area or hide their number, non-emergency is how they have to do it. This is suspicious because in a real situation like “I just shot my dad” or whatever they say, nobody is taking time to look up non-emergency.

[-] Bitrot@lemmy.sdf.org 4 points 5 days ago

Cylons leave nothing to chance.

[-] Bitrot@lemmy.sdf.org 2 points 5 days ago

It has activation issues as the license is tied to hardware. If you have a retail license tied to your account it will prompt you to transfer from another machine, OEM does not. Nowadays people don’t even get a key, although it can be extracted from the firmware.

[-] Bitrot@lemmy.sdf.org 1 points 5 days ago

Most people are running Windows OEM licenses that don’t transfer to VMs. A retail license you can move around.

[-] Bitrot@lemmy.sdf.org 31 points 6 days ago

Easter egg and a little fun. Been there for decades.

[-] Bitrot@lemmy.sdf.org 137 points 4 months ago* (last edited 4 months ago)

They are using Linux as the hook in the headline, the attack on kernel.org was widely reported when it happened, over a decade ago, although maybe not so publicly dissected. There was even an arrest.

The same malware is still active in the wild and attacking other people, that’s the real point of the article.

[-] Bitrot@lemmy.sdf.org 152 points 8 months ago* (last edited 8 months ago)

Mark Ewing used to wear a red Cornell lacrosse cap and when he would help in computer labs people would look for a the man in the red hat. The company was called Red Hat after Mark but their logo has been a person in a fedora for a long time.

Fedora is a community continuation of Red Hat Linux, which was discontinued in favor of Red Hat Enterprise Linux. Back when I was starting out Fedora wasn't a thing, you downloaded Red Hat Linux for free directly from the company or could buy it in a box.

57
submitted 8 months ago* (last edited 8 months ago) by Bitrot@lemmy.sdf.org to c/sdfpubnix@lemmy.sdf.org

@SDF@lemmy.sdf.org or whomever is responsible, thanks for updating the software to 0.19.1 (rc). Silly me I thought it was unlikely to happen over Christmas.

Really appreciate you taking the time over the holiday to update and hopefully resolve the issues we've been seeing for a while.

Let the comments flow!

view more: next ›

Bitrot

joined 1 year ago