Yup.
FYI, I also commented with a link to distrowatch that announces it.
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork
Yup.
FYI, I also commented with a link to distrowatch that announces it.
In my opinion, the article provides absolutely no proof of any of its assertions, there are no links to source material, the author cites no research and in general appears to have written an opinion piece specifically for the purpose of alarming the reader.
This doesn’t mean that the author is wrong, but it also doesn’t mean they’re right either.
Extraordinary claims require extraordinary proof and this has plenty of the former and nothing of the latter.
I think that what you’re looking for is “CPU affinity”, but that is not something I know anything about.
In the 40+ years I’ve been playing with computers, I’ve always let the OS worry about where and when to run a process and only rarely do I renice
a process that needs to run, but not at the expense of everything else.
A Docker container is a security framework. The process running “inside” the container is just a Linux process like any other.
So, as I understand it, the performance will be identical to a process that is running “outside” a container, subject to the overhead associated with any security restrictions.
bash?
It’s not very complicated. I’ve been generating my podcast RSS file with it for years.
… just a sudden influx of people moving continents … nothing to see here …
Ethernet over Power, not to be confused with Power over Ethernet, which are NOT the same thing.
and was never exploited by an attacker
… that they know of or admitted to.
To answer your post title question, I suspect that at this point it seems counterintuitive to introduce complexity in an environment already rife with exploits.
It’s not like it’s a new idea either. Microsoft published research on this in 2009, 16 years ago.
The abstract on that link holds the promise of many benefits, but it appears to carefully avoid specific claims, which makes me wonder if the idea ran into unexpected hurdles, which is common in software development.
The abandonment of the Barrelfish project is probably an indicator that this is an idea that didn’t pan out.
Having said that, I haven’t dug into kernel development over the past 40 years of my career, so it might well be that aspects and nuances of this idea were adopted and are in common use.
I confess that it is always odd to see a musician, now deceased for a decade, when searching for this platform. Mind you, that is an ongoing tribute to their legacy, which is how it came about.
In a 2020 post, Lemmy’s co-creator Dessalines wrote about the origin of the name Lemmy. “It was nameless for a long time, but I wanted to keep with the fediverse tradition of naming projects after animals. I was playing that old-school game Lemmings, and Lemmy (from Motorhead) had passed away that week, and we held a few polls for names, and I went with that.”
Source: https://en.m.wikipedia.org/wiki/Lemmy_(social_network)#History
In security, resilience and disaster recovery discussions with your client, how do you go about threading the needle between “scaring the pants off them” and “she’ll be right mate”?
When I look around me, the weight of discussion seems to be towards the latter, rather than the former. I could conclude that the client has been getting advice from idiots and charlatans, but that might be considered uncharitable, not to mention potentially career limiting.
I’ve had to read the riot act on a couple of occasions in my 40 year career, whilst it gets the job done, it’s never fun.
What is your winning strategy to get the client to go, oh, Oh, ooooh, fuck, without running a mile?
JavaScript is often used in modern websites to actually render content, as-in, generate what you see on the page. Blocking access is possible if you don’t have JavaScript enabled, but it’s rare. More likely it’s just not showing content because it’s not there.
Disabling JavaScript in and of itself is not something I understand as a viable way to interact with the internet.
You are better off anonymizing your browser. You can do this by launching separate instances without any profile in incognito mode and only use it on one site before closing it down.
You can also automatically “crawl” websites using tools like headess Chrome and Puppeteer. No doubt there are websites that will do this for you, for a fee.
Ultimately, JavaScript is a programming language, nothing more, nothing less.
If you build a static website, you can host it on AWS S3 and it will likely cost you cents to run. S3 on its own will handle a lot of traffic and you’re unlikely to hit that threshold, but if you do, you can add AWS Cloud Front and have a site that can handle more traffic than you can imagine.
This will not work. It sounds great, it sounds plausible, even realistic at some level, but this will not work.
Here’s why.
The bot operator has more money than you do. If the efficiency of one bot decreases on one website, they’ll throw another bot at it, rinse and repeat until your website stops responding because it’s ground to dust.
Meta bots are good at doing this, hitting your site with thousands of requests a second, over and over again.
Meta is not alone in this, but in my experience it’s the most destructive.
Source: One of my clients runs a retail website and I’ve been dealing with this.
At the moment the “best” - least worse is probably more accurate - “solution” is to block them as if they’re malicious traffic - which essentially is what they are.
I have been making a weekly podcast about amateur radio since 15 May 2011. It started life as “What use is an F-call?” and in 2015 was renamed “Foundations of Amateur Radio”. I’ve made over 700 episodes so far.
Starting in the wonderful hobby of Amateur or HAM Radio can be daunting and challenging but can be very rewarding. Every week I look at a different aspect of the hobby, how you might fit in and get the very best from the 1000 hobbies that Amateur Radio represents.
It’s available as audio, text, email, RSS, YouTube and Morse code and can be found on many podcast platforms. It’s also available on amateur radio repeaters, as eBooks and on lemmy.radio and it can be downloaded from the Internet Archive.
More info: https://podcasts.vk6flab.com/
Feel free to ask questions.
Onno (VK6FLAB)
If you run dmesg -T
you can see the entire boot log with human readable timestamps.
It seems appropriate to describe Facebook itself as a cybersecurity threat because of the OS platform it runs on. Perhaps they should also ban all the technologies named on this page … just to be safe.
https://en.m.wikipedia.org/wiki/Facebook