- 0 Posts
- 80 Comments
trolololol@lemmy.worldto
Cybersecurity@sh.itjust.works•Iran Disrupts US Critical Infrastructure Via Exposed PLCsEnglish
6·26 days agoYep that’s what I though, this looks like payback from that.
The Dark reading article seems to be quite detailed but isn’t very serious though. Near the end it suggest these countermeasures:
to remove PLCs from direct Internet exposure and implement secure gateways and firewalls
place the physical mode switch on the controller into the “run” position
All I can offer is surprised Pikachu face.
trolololol@lemmy.worldto
Programmer Humor@programming.dev•Why are you crying, Windows user?
2·1 month agoAnd don’t you dare compile kotlin and run on emulator while you use Chrome to read stack overflow. Those 128Gb ram from that guy are going to be short.
trolololol@lemmy.worldto
Programmer Humor@programming.dev•Why are you crying, Windows user?
31·1 month agoThat’s a bit small… for disk space 😂😂😂😂😂
You can actually do a lot of stuff with this and no disk at all , just having a 500MB NFS over nas or some 2010 old laptop 🤣🤣🤣🤣🤣🤣
Oh is that how you guys install snaps?
/evil laugh
trolololol@lemmy.worldto
Selfhosted@lemmy.world•Rootless Containers with PodmanEnglish
51·3 months agoI’ve heard of podman quite a bit but never tried it.
Is it truly free and open source?
Does it run only in Linux?
trolololol@lemmy.worldto
Programmer Humor@programming.dev•I still haven't figured out how to do this
2·3 months agoUnlucky I’d say.
I haven’t touched Word in almost a decade because I’ve been fortunate to work in companies that don’t pay for Microsoft suite, instead using Google suite. And I’ll tell you, not only I need to use it very very little but also it’s much easier to get things done than Microsoft products.
What do I use daily? Slack and confluence. But we don’t need to talk about those, do we?
Gen alpha beta whatever will need those Microsoft skills when they enter workforce in corporations full of genz, because that’s pervasive cyber tools in those pieces. You can talk all you want about libre Office, but that’s not what man child ceo of big companies do, because they’re affairs of their man child friends peer pressure. Hive mentality.
trolololol@lemmy.worldto
linuxmemes@lemmy.world•Not that I or anyone would ever have issues.
2·3 months agoI have trouble using Mac. Besides that it sucks, last time it was my main machine was almost 10 years, so I don’t remember basic stuff.
Does that make me a normie? ☺️☺️☺️
Aw do they also hand out unicorns for Xmas?
Some corporations do that, most don’t even if they’re trying to, because incompetence.
I liked both this and the following article.
Pretty cool seeing everything it takes to have a minimalist Linux to boot, and I finally saw how to get started with strace that I’ve been postponing for like half a year.
I can’t do that Hal.
The best I can do is install a plugin for more ads.
trolololol@lemmy.worldto
Linux@lemmy.ml•What are the options if my country makes VPN's illegal?
3·6 months agoNot exactly since your VPN could be in a country that doesn’t give a shit about the laws in your country .
trolololol@lemmy.worldto
Linux@lemmy.ml•What are the options if my country makes VPN's illegal?
8·6 months agoThis, but I’d use separate browsers to keep seperate digital fingerprints. Otherwise your ad trackers would know it’s the exact same person going to site a directly and site b indirectly.
Also worth noting that Facebook has a back door on its mobile app, that keep listening on some port. When you use certain apps with meta code ( could be a newspaper that monetizes with Facebook ads ) or websites with meta code ( same “newspaper”), those apps/websites send your ad tracker id directly to Facebook app through that port. This de-anonimizes the shit out of your “anonymous” ad IDs. Other techniques rely on lots of data points and some degree of guessing, but this ways it’s mercilessly effective and accurate.
trolololol@lemmy.worldto
Cybersecurity@sh.itjust.works•Nation-state hackers deliver malware from “bulletproof” blockchains - Ars TechnicaEnglish
8·7 months agoI quite didn’t understand what happens after the malware is up in the block chain. Do I get infected if something sends me currency? Or would it take some action from me, like willingly entering a contract?
Needs more crayons. That’s the only thing that can keep the useless people busy so we can get shit done.
trolololol@lemmy.worldto
Programmer Humor@programming.dev•there's no escape! brew another cup!
9·10 months agoDoes that stand for SQL WTF?

I’m still trying to work out how to do ci tests without GitHub actions or a credit card or self hosting.