vk6flab

joined 11 months ago
[–] vk6flab@lemmy.radio 32 points 3 weeks ago (4 children)

Why do we have to trawl through the bottom of Xitter?

I thought that we all left them behind to come here so we could get on with making a better global community.

[–] vk6flab@lemmy.radio 58 points 3 weeks ago (4 children)

If this company that's tied to the bankrupt individual has money to bid, does that mean that money is already part of the bankruptcy proceedings and if not, why not?

[–] vk6flab@lemmy.radio 6 points 3 weeks ago (1 children)

You don't need a specific service to do this, you can run your own.

Set-up a PayPal account, let people pay into the account, donate the funds to the NGO.

[–] vk6flab@lemmy.radio 8 points 3 weeks ago

I'm guessing that you had to take this photo in January, so your face is fully healed from the feline claw marks by the time Christmas comes along.

[–] vk6flab@lemmy.radio 9 points 3 weeks ago

If you're looking for a renewed sense of respect for a crow, here's Mark Rober, (of glitter bomb and squirrel fame) with eye opening crow activity.

https://youtu.be/tpg3VvoIVfA

[–] vk6flab@lemmy.radio 16 points 3 weeks ago (10 children)

Word of caution, it doesn't render on Connect for Lemmy.

[–] vk6flab@lemmy.radio 16 points 3 weeks ago (4 children)

This is now what spammers are doing. I've got about 50 different "companies" offering their services complete with follow up, meeting bookings, reminders and encouragement to sign up now, then come the threats or request for acknowledgement, then they change their email address and start from the top.

Come to think about it, it's probably more like 100 different attempts, each with their own repeating thread.

99% automatically land in my spam folder, but it's just ludicrous. It also makes actual commerce via email pretty much impossible.

I've had offers for lead generation, appointment setting, transcript services, SEO, website redesigns, app development, social media marketing and management, investment opportunities, offers for speaking engagements, conference sponsorships, purchasing and product offers, the list is endless.

[–] vk6flab@lemmy.radio 3 points 3 weeks ago (1 children)

For actual RF based radio around the planet there's websdr and kiwisdr. Both those platforms have actual wideband receivers run by (mostly) radio amateurs and accessible by any web browser. It's like having access to a collection of shortwave radio receivers.

Broadcastify is a platform where people share internet streams of local radio transmitters, also accessible via the web.

There's radio applications like TuneInRadio that package some of this up and slather it in advertising.

Source: I'm a licensed radio amateur and this is what I do for fun :)

[–] vk6flab@lemmy.radio 16 points 3 weeks ago* (last edited 3 weeks ago) (2 children)

People don't agree on anything, ever. What you think of as "normal" is absurd to someone else and vice versa.

I've always wondered what posesses someone to down vote a genuine question, but I've made my peace with it by looking at it as "people will be people".

Today I try to read and contribute as I feel the urge. I don't follow many, if any, people or communities and just take the feed that comes past my eyes as a slice of life.

It's made for a lot less stressful experience and it allows me to (dis)engage as my energy levels permit.

I hope you find your way .. life is amazing and diverse and there's plenty of fun and interesting things to experience.

[–] vk6flab@lemmy.radio 12 points 3 weeks ago (1 children)

The tool providing you with access to that Google Drive has not made the storage space available in any way that can be used by the rest of the system.

The problem lies with that tool, not any application or operating system.

I'd be surprised if there's not a better tool that uses "fuse" to access Google Drive.

[–] vk6flab@lemmy.radio 4 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

The OSIRIS-REx did manage to bring back some material from Bennu. We retrieved 121.6 grams and it cost around a billion dollars. It took 8 years.

https://en.m.wikipedia.org/wiki/OSIRIS-REx

Edit: Fixed how much it cost.

[–] vk6flab@lemmy.radio 3 points 3 weeks ago (1 children)

You should take into consideration that AFAIK none of these companies have launched anything, let alone started mining.

 

Just in case you're like me living under the mistaken belief that the only Rapid Antigen Tests available are for COVID.

 

This is a sobering post that revisits the notion that given a project, how many developers have to be hit by a bus before it stalls.

According to the methodology explained in the article, in 2015 it took 57 developers for the Linux kernel to fail, now it appears that it takes 8.

That's not good.

9
submitted 3 months ago* (last edited 3 months ago) by vk6flab@lemmy.radio to c/sysadmin@lemmy.world
 

Anyone here have any experience with a Datto Backup Appliance?

I have just been told that they've never run a full restoration in the six years that it's been in service, deployed for the backup of four mission critical virtual Windows Servers, four Windows Workstation and a (physical?) Linux PABX server.

The actual appliance is apparently a "Datto S3-2000 BCDR"

Edit: The anal retentive in me is going WTF in a tight loop. The industry professional with 40 years experience in the field is going, different day, same old...

I realised that I didn't actually ask the pertinent question, the hamster wheel was running full tilt, but is this normal, or is this WTF, or somewhere in-between?

 

Starting yesterday, Connect hard crashes when you attempt to click on the Inbox and the same happens if you click on the notification bell showing that there are messages.

As of this morning, the Inbox sidebar label is coloured Red instead of Blue.

Connect Version 1.0.190 Android v13 with latest security patches

 

A cookie notice that seeks permission to share your details with "848 of our partners" and "actively scan device details for identification".

 

How are you storing passwords and 2FA keys that proliferate across every conceivable online service these days?

What made you choose that solution and have you considered what would happen in life altering situations like, hardware failure, theft, fire, divorce, death?

If you're using an online solution, has it been hacked and how did that impact you?

 

My search has been without results.

My "new" model remote with a Siri button keeps needing to be reset to control my infrared amplifier. Press and hold the Volume Down and TV button works, but it's annoying when you want to change the volume whilst watching something and it doesn't respond.

Firmware version is 0x83.

Anyone got any ideas what might be causing this?

 

I've been using VMware for about two decades. I'm moving elsewhere. KVM appears to be the solution for me.

I cannot discover how a guest display is supposed to work.

On VMware workstation/Fusion the application provides the display interface and puts it into a window on the host. This can be resized to full screen. It's how I've been running my Debian desktop and probably hundreds of other virtual machines (mostly Linux) inside a guest on my MacOS iMac.

If I install Linux or BSD onto the bare metal iMac, how do KVM guests show their screen?

I really don't want to run VNC or RDP inside the guest.

I've been looking for documentation on this but Google search is now so bad that technical documents are completely hidden behind marketing blurbs or LLM generated rubbish.

Anyone?

 

There is a growing trend where organisations are strictly limiting the amount of information that they disclose in relation to a data breach. Linked is an ongoing example of such a drip feed of PR friendly motherhood statements.

As an ICT professional with 40 years experience, I'm aware that there's a massive gap between disclosing how something was compromised, versus what data was exfiltrated.

For example, the fact that the linked organisation disclosed that their VoIP phone system was affected points to a significant breach, but there is no disclosure in relation to what personal information was affected.

For example, that particular organisation also has the global headquarters of a different organisation in their building, and has, at least in the past, had common office bearers. Was any data in that organisation affected?

My question is this:

What should be disclosed and what might come as a post mortem after systems have been secured restored?

 

Anyone know of any scriptable asynchronous communication tools?

The closest so-far appears to be Kermit. It's been around since CP/M, but apparently there's still no centralised language reference and the syntax predates Perl.

0
submitted 9 months ago* (last edited 9 months ago) by vk6flab@lemmy.radio to c/privacy@lemmy.ml
 

U2F keys can be purchased online for the price of a cup of coffee. They're being touted as the next best thing in online security authentication.

How do you know that the key that arrives at your doorstep is unique and doesn't produce predictable or known output?

There's plenty of opportunities for this to occur with online repositories with source code and build instructions.

Price of manufacturing is so low that anyone can make a key for a couple of dollars. Sending out the same key to everyone seems like a viable attack vector for anyone who wants to spend some effort into getting access to places protected by a U2F key.

Why, or how, do you trust such a key?

The recent XZ experience shows us that the long game is clearly not an issue for some of this activity.

view more: next ›