iocseb

joined 2 years ago
[–] iocseb@lemmy.ml 3 points 2 years ago (1 children)

I think any distributed power structure relies heavily on a “good” value system. But yes, if you somehow can ensure good values broadly, it probably works.

[–] iocseb@lemmy.ml 0 points 2 years ago (1 children)

Great article! Also, thanks a lot for adding the additional arguments from this thread - Makes it much better.

[–] iocseb@lemmy.ml 1 points 2 years ago* (last edited 2 years ago)

All the things that have been said already.

PLUS that there is a very nice app on iOS (Remmel) for it

[–] iocseb@lemmy.ml 2 points 2 years ago (1 children)

Do we trust a centralized app store based on Flatpak more than snapcraft, which is owned by Canonical? What is the difference between these two from a ideological perspective?

 

I noticed that many Linux communities have a rather tough culture on their forums and community channels. Was wondering which Linux community does a better job on keeping a nice and friendly attitude.

[–] iocseb@lemmy.ml 1 points 2 years ago

I did not know that there is a Linux Mint community. Thank you for pointing that out to me.

[–] iocseb@lemmy.ml 3 points 2 years ago (1 children)

The most secure OS is the OS you understand to properly configure and maintain. If you know how to properly configure and maintain Windows, you can be more secure than a Linux PC that is run without much thought about security.

If the question is which OS comes with the most secure default settings, MacOS surely beats Windows and a security focused and mature Linux distro likely beats them all. However, there are great variances in security based on the distro.

I started to do some security reviews on the most popular Linux distros a couple of days ago - You can read them here: https://decrypt.fail

 

MX Linux collected 10 out of 18 possible points – A good balance between UX and Security.

[–] iocseb@lemmy.ml 0 points 2 years ago

Yes. I’m saving for my wife’s and I retirement. I also want to make sure that our kids don’t have to support us when we are old.

[–] iocseb@lemmy.ml 2 points 2 years ago

I have been charging my phone wirelessly for the last 3 years. I put my phone on it over night and is fully charged in the morning. Much easier than trying to fiddle with a cable in the dark.

[–] iocseb@lemmy.ml 1 points 2 years ago

I second that! I run two mid-sized mastodon instances and definitely see the appeal of a fedi guild.

[–] iocseb@lemmy.ml 2 points 2 years ago

This problem seems similar to the discovery problem small Mastodon instances have.

On Mastodon some folks have created bots that follow new users on other instances automatically, which half of the mastodon fediverse found very annoying.

 

Nice article on the various types of cybersecurity roles and where to start when entering the field.

 

A container-based approach to boot a full Android system on a regular GNU/Linux system like Ubuntu.

 

This post tries to summarize the key steps to take for an effective Privilege Access Management program. Segmenting Privileges in an Active Directory based IT infrastructure is a key defense strategy against automated as well as human operated Ransomware attacks.

[–] iocseb@lemmy.ml 3 points 2 years ago (1 children)

Definitely try Pop!_OS! It has a very usable and fast desktop environment and comes with a well maintained software manager.

view more: next ›