To be fair, even in Linux it’s really hard to kill a zombie process. You have to tell the parent to own up to their kid, and then kill the parent.
To be fair, even in Linux it’s really hard to kill a zombie process. You have to tell the parent to own up to their kid, and then kill the parent.
People say this all the time, but it’s not really the case.
Except that it is, people with the skills already bridged that gap for everyone.
https://kbin.earth/m/[email protected]/t/267356/Lemmy-devs-are-considering-making-all-votes-public-have-your/favourites
Just so you’re aware
https://kbin.earth/m/[email protected]/t/267356/Lemmy-devs-are-considering-making-all-votes-public-have-your/favourites
No need for a Lemmy server, kbin/mbin put it in their interface
https://kbin.earth/m/[email protected]/t/267356/Lemmy-devs-are-considering-making-all-votes-public-have-your/favourites
Saying the fediverse is good for privacy is just plain false, that’s the kind of information anyone can acquire, even an ad company. All they have to do is federate a silent instance and see all you do.
Depending what’s you router you can usually open communication between different VLAN for specific ip/port. So let’s say your camera use rtsp to send video data to your NVR you could allow for port 554 to be opened between your camera ip and the NVR.
This means that even if someone has access to your camera they couldn’t do an ssh (port 22) or http/https (80/443) requests to your internal network.
For PoE cams installed outside, creating a separate VLAN is an absolute must. Otherwise anyone could use the Ethernet cable to access your network and steal your data.
I consider open source software to be community owned/maintained so I never liked the idea of selling the software. It makes much more sense to my eyes to sell services surrounding the software be it support, customizations, or even hosted services.
I can’t really get over selling a “license” for a software that is expected to still be maintained by unpaid contributors. Especially under an AGPL license where any licensing changes has to be approved by every contributors.
If the attacker search for your password specifically then xkcd themself posted the reason why it wouldn’t really matter
https://www.explainxkcd.com/wiki/index.php/538:_Security
If you’re doing blind attemps on a large set of users you’ll aim for the least secured password first, dictionary words and known strings.
The part where this falls flat is that using dictionary words is one of the first step in finding unsecured password. Starting with a character by character brute force might land you on a secure password eventually, but going by dictionary and common string is sure to land you on an unsecured password fast.
5.2 , slowly migrating all my homelab to quadlets.