• 0 Posts
  • 33 Comments
Joined 11 months ago
cake
Cake day: August 8th, 2023

help-circle





  • Yeah, that was you continuing to show how inexperienced you are.

    For a remote exploit to work the computer or device has to expose ports to the network your computer is connected to.

    “Remote” means that the vulnerability does not require local access. So if your friend connects his infected device to your wifi, all devices connected to the same network essentially are at risk, depending on what’s listening on the devices and what vulnerabilities they have.

    Your idea about avoiding bad websites is ridiculous. History is full of examples where third party ads had been created to infect one way or another. That’s ads that users on legitimate site were exposed to. That’s just one little example. There have been numerous examples of malicious sleeping JavaScript code that suddenly wakes up and contacts it’s command-and-control server and then download malicious JavaScript code to unknowing site visitors.

    Furthermore, you didn’t understand my question. Of course antivirus is able to stop malware it recognizes that enters through a remote exploit. The user with antivirus would at least have a chance of knowing that something was up each time and attempt to infect was made.

    You on the other hand would sit there clueless with your little zombie computer and laugh at all them script kiddies.

    But hey… You just continue trying to infect others around you with bad security advice and have a good day. I’m outta here.






  • If your computer is network connected you really really need antimalware running. In theory, a game server could be exploited and controlled to inject malware into game clients ( = you playing online).

    If you use a browser to access internet, there has been malware infected ads that infect your computer when you visit legitimate web sites.

    If you get infected, the malware most likely won’t do anything that makes you notice it. It all depends what the purpose of the malware is.

    Ransomware? Then it stays hidden until it has encrypted all your files and then it pops up telling you to pay or you won’t be able to use your computer.

    Collecting useful passwords? Getting full access to your Steam account is nice. Got some awesome weapons and armor in the MMORPG you play? That’s something they theoretically would script to be able to steal from you.

    Or maybe the malware just stays hidden for now, contacting it’s control center now and then to see if there is any instructions.

    Malware is business. The people behind it are businessmen and you are part of what they sell.

    If you have a fairly modern computer there shouldn’t be that much impact on the performance.



  • If you want to promote your position - and it may not please someone and that is normal in a democratic society - take responsibility. What are you afraid to say who you are?

    While I understand the problems the propaganda machines of Russia and China (among other) causes, this here is some stupid shit

    Try to criticize Putin openly while living in Russia, speak up for the freedom to love and have sex with whoever you want in Uganda or publish pictures of Muhammad as a dog and sign all of it with your name and see what will happen.

    Anonymity is a double edged sword. While being “nice to have” in a democracy it’s a “must have” in a dictatorship.



  • mindlight@lemm.eetoAsklemmy@lemmy.mlIs RAID still needed?
    link
    fedilink
    arrow-up
    53
    arrow-down
    1
    ·
    3 months ago

    Yeah and Titanic was unsinkable.

    If the controller in your SSD fries, it doesn’t matter how many unused gigabytes your SSD has got for relocating bad sectors. It is still fried. For you, that data is forever gone.

    This is why you have redundancy. Full redundancy. You can go for RAID1, one disk die and you still have no data loss, or go bananas with RAID6, two full disks can die and you’re still going strong.

    Ps. Spinning harddrives have had hidden sectors used for relocation of bad sectors for ages. It’s nothing new. If you have to much time on your hand, Google harddrive hidden sectors nsa.


  • Wall of text, I know, but I had trouble sleeping so… Yeah… Here goes;

    Knowledge is power.

    Here in Sweden there’s a service that has been pouring money on marketing the last two years. The service is called House ID and they let you store all important documents about your house for free… Free… Free?

    So what will they make money on?

    Well, let’s jump 10 years into the future and just imagine the possibilities.

    Criminals can easily check what house owners have upgraded their locks or purchased home alarm systems. They could even purchase data about all the houses in an area that has a specific lock type with a known flaw.

    Your phone is, with all its sensors, a fantastic surveillance device and people happily take it with them wherever they go.

    In the 90’s, when I worked for IBM, the buzzword was “Data mining”. Ordinary people never understood what it was and I was often asked about it. Extremely simplified: look at the data you have and try to read between the lines to generate data that you originally didn’t have.

    The biggest chain of convenient stores in Sweden launched banking services and a pay card around this time. If you used the card for grocery shopping you’d get a monthly bonus and great offers and discounts. So I gave an innocent example of what your purchase data could be used for. They could see that a woman purchased pads on fairly the same time each month or quarter. Now, when cross checking this with purchase history from other women they could see that a lot of those women also purchased chocolate at the same time they purchase pads. Something something with a lot of women getting cravings of chocolate around the same time each month. Yes, it’s a generalization but still a real life example in this case. So they sent out coupons for chocolate, matching the time around when the customer normally purchased pads, and what do you know? The sale of chocolate increased. Significantly.

    Now, pads isn’t a very sensitive subject of you’re older than 15… But think what data Tinder registers. They can’t know for sure if you’re liberal, conservative or even a communist… or can they? By looking at your behavior in their app, what you did, where (Tinder uses GPS, remember?) you did it and when you did it, they can draw conclusions about a lot of things that you never intended to share with them.

    Today there are sensors placed strategically in shopping malls that registers what store windows you stopped to look at. They actually know, with a pretty high certainty, exactly what product in the window that caught your attention. How they can be so accurate you say? Because you have Bluetooth activated and the mall app installed. They just triangulate your exact position.

    All of this is data about you that is correct. You did all of that and it was registered.

    But what if corrupted data was registered? What if that data was the basis for you getting a loan for your dream house? How do you correct a conclusion that is obviously wrong when the bank just tells you that what data they purchase, from who and how they process it is a business secret and they refuse to share any details.

    Now, all sorts of data has always been collected but in the old time it was stored on paper and cross comparison/compiling data was an expensive and tedious task. Today it is not. Today your phone could store and process data that would take months to process in the old times.

    That slowness/inertia acted as a law of nature, protecting us and our life from being mapped.

    It’s not just that data is collected or what data is collected… It’s what it might be used for that should bother you. Not only what is used for today but also what it could be used for tomorrow.



  • You want to have both hands free while moving or an extra dose of speed to go faster? With the Mobility Plus Package you can activate a variety of clever additional functions in the Mobility App.

    With the Mobility Plus Package you can increase the support speed from 6 km/h to 8,5 km/h and benefit from the Cruise Mode that allows you to keep a permanent speed with only one deflection on the push rim.

    Holy fuck!?!? The wheelchair is actually actively crippled if you don’t pay?

    If you are able to crack software, this is the time to stand up and do actual real good for humanity !

    This makes me so angry.



  • Normally it’s not lack of Windows compatibility breaking the use of an application with wine, it’s the frameworks and libraries the application was built with/need to have access to.

    So check what additional libraries and stuff your application have as a prerequisite. Visual C 2005? 2010? DotNet framework? Which version? And so on.

    When you know what the application needs, then you can Google for “wine DotNet 4.5” (just an example) to get a feeling what problems people had and how they solved it.

    Essentially wine needs to know where to find them when you start your application with/in wine.

    Also, if your application uses MSSQL Express or similar, you might be out of luck. So if that’s the case you should start googling on how to get that running (if even possible) before installing.

    Good luck, be stubborn and make sure to have fun. There’s a lot you’ll learn in this adventure of yours that will come in handy again and again in the future.