Our News Team @ 11 with host Snot Flickerman

  • 2 Posts
  • 521 Comments
Joined 1 year ago
cake
Cake day: October 24th, 2023

help-circle



  • I’d say the biggest, most glaring hole is that, much like in Windows, most users don’t really understand the file system and user and group permissions.

    Linux, as an OS, requires a lot more on the users part in understanding basic security right out of the gate.

    A lot of folks out here dropping chmod 777 all over the place just because they haven’t had any education on how any of it works.

    Source: Years ago, being a newb without knowledge or education, dropping chmod 777 all over the place



  • I think it’s rather corporate targets get bigger results than individuals.

    Hacking an individual is good if you need a zombie for a botnet.

    Hacking a hospital and hitting them with ransomware? Hospitals got some damn money. Regular people do not.

    Further, while users might be installing FOSS left-right-and-center, unlike corporations who are installing FOSS, most of what the average user installs doesn’t need secure networking and access control rules behind it. Most corporations use a variety of different FOSS all together in one package, and most of them are internet and network oriented, to function at scale, and as such, they have way more easy ways to get in and have way more valuable assets.

    I think, even if it had major market share, that most attacks go after big entities these days because the risk just isn’t worth it with small potato people like me who are broke, comparatively.


  • Most Linux malware/viruses target corporate servers.

    It’s not that there isn’t Linux malware or viruses, there’s plenty.

    It’s rather that you and me as individuals just aren’t that important nor do we likely have enough assets to justify us as a target to begin with.

    Corporate servers are more likely to have a large combination of technologies that allow hackers to infilatrate to begin with, whereas the average home user might not have many programs installed, especially not a large number that need network access and thus complex access control rules.


  • Snot Flickerman@lemmy.blahaj.zonetoLinux@lemmy.mlParental controls?
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    11 days ago

    Exactly. I don’t personally have kids so I also feel especially out of line telling someone else how to raise theirs. Parenting isn’t easy, and there’s tough questions like “How do I get my child to learn good habits around screen time so they don’t end up addicted to devices built for addiction?” Honestly, I personally don’t know a better way other than loosely (not strictly) limiting screen time enough so that they naturally learn good habits over time, and that unfortunately means you need to monitor screen time. As an adult I noticed a lot of my good habits were things my parents instilled in me in my youth that I hadn’t really thought about, like drinking a lot of water, for one. They didn’t prevent me from drinking soda at all, but they limited my intake at home and made sure when I was home I was drinking lots of water and not just juice or soda, they didn’t try to control me outside of the house when I was making my own decisions… and now I drink water a lot because it just feels normal. It’s a habit they got me into, and because it became a habit I’m left with a good habit in my adulthood. I don’t see how it would be any different in getting a kid to respect screen time as an adult.

    God… I wish my parents had done more to monitor my screen time because I’m bad at this shit.




  • The goal of ActivityWatch is simple: Enable the collection of as much valuable lifedata as possible without compromising user privacy.

    We’ve worked towards this goal by creating an application for safe storage of the data on the user’s local machine and as well as a set of watchers which record data such as:

    Currently active application and the title of its window Currently active browser tab and its title and URL Keyboard and mouse activity, to detect if you are AFK (“away from keyboard”) or not

    It is up to you as user to collect as much as you want, or as little as you want (and we hope some of you will help write watchers so we can collect more).

    Well, they linked to the releases page instead of the main page for the project, for one.


  • Snot Flickerman@lemmy.blahaj.zonetoLinux@lemmy.mlParental controls?
    link
    fedilink
    English
    arrow-up
    51
    arrow-down
    4
    ·
    edit-2
    11 days ago

    Personal opinion, I don’t understand why more parents haven’t moved to use Pi-Holes for content blocking. Since you can tailor your own blocklists, it’s not impossible to do, and I’m pretty sure some enterprising folks have already made a Pi-Hole block list for porn and various adult websites.

    Further, if your child figures out how to bypass the block, they’re learning valuable skills, if nothing else.


    To be fair, it seems like you’re more concerned with overall screen time, and I don’t have a better solution for that than you already have.



  • Do you do much uploading or want to host anything for friends to stream from you?

    A DOCSIS 3.0 modem tops out at 100Mbps upload, while a DOCSIS 3.1 tops out at 2Gbps upload. I know Comcast/Xfinity sucks, but they’ve definitely rolled out 2Ghz download and 2Ghz upload symmetrical connection in some areas.

    I agree that 1Ghz seems plenty, but I regularly feel more limited by upload speeds, personally. If upload doesn’t matter so much to you, then that’s the only thing that stood out to me as a difference.


    With WiFi the bigger question is if where you live is so big that you need extenders of some type. Even with more modern “mesh” systems, you still often need hardwired Access Points.

    If the only WiFi you use is your router, because you’re in a small house/apartment, then you don’t really need anything fancy and an AC wireless router will do you fine. If you need a large area covered and don’t want dead zones, you’ll need proper mapping and setting up of Access Points whether you are using a more modern mesh network or not.


  • There’s also SimpleX chat and Briar, but I’ve used both of those less than Matrix. They seem to be aiming to solve the last few issues that Matrix has, like usernames and metadata leakage.

    I consider Matrix to be closer to an “Enterprise” solution, like what a business or government or non-profit would use for secure communications (literally both French and German governments use Matrix), while SimpleX/Briar seem much more aimed at individuals just wanting control over their personal conversations.



  • Snot Flickerman@lemmy.blahaj.zonetoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    37
    arrow-down
    1
    ·
    edit-2
    12 days ago

    And if they had implented that to begin with and used servers that kept no logs he wouldn’t have had anything of value to hand over and they would have had to release him since he physically could not provide those things.

    He built the damn situation for himself, and the fact that such issues weren’t considered practically screams “honeypot.”



  • pcpartpicker.com is a good place to start and can help you know if specific parts are compatible but it’s just a place to start and is often still missing important info.

    So you still need to do due diligence and do things like check measurements to make sure, for example, your video card will actually fit inside your case, etc.

    Also, since its your first time, you want to avoid any motherboards that require you to do a BIOS update to handle a newer processor, because that’s just complicated stuff that you’re going to want to skip as a beginner.

    It’s more expensive but go for a newer motherboard that is compatible with your processor out-of-the-box.