This requires people to play by the rules. I’ve yet to play a game that actually follows the written rules.
This is a secondary account that sees the most usage. My first account is listed below. The main will have a list of all the accounts that I use.
Personal website:
This requires people to play by the rules. I’ve yet to play a game that actually follows the written rules.
I think the driver is up to date because I’m on the latest 6.8 kernel. Firmware, TP-Link offers none for their junk.
Is there a way I can check if it’s a driver or a firmware issue? I took a look at the driver code to TBF I’m not enough of an expert to understand how it actually talks to the device.
My network adapters send corrupted packets unless I disable RX/TX offloading with ethtool
(this feature is turned on by default). Is this normal? Should I be able to do checksum and TCP session offloading?
Excellent! More teeth for the teeth cup.
It’s not unusual to have brief hallucinations right before falling asleep. It’s happened to me on occasion. That’s another possible explanation.
I wish this was a thing when I was writing application essays. They’re a great example of virtually meaningless content that needs to fit a certain shape.
LLMs are great at generating exactly this type of garbage.
It is highly unlikely that you have malware sophisticated enough to do something like compromise installation media (already exceedingly rare) yet not sophisticated enough to bypass secure boot.
The purpose of secure boot is to verify that the boot loader and kernel are approved by the manufacturer (or friends of such). There are certainly ways to inject software into a system that doesn’t reside in those locations. It just makes boot sector viruses and kernel mode rootkits slightly more technically challenging to write when you can’t simply modify those parts of the operating system directly. If malware gets root on your installation it’s game over whether or not you have secure boot enabled. Much of the software on a computer is none of those things protected by secure boot.
Plus, take another wager: most systems today ship with secure boot enabled. If you were a malware author, would you still be writing malware that needs secure boot turned off to run? Of course not! You would focus on the most common system you can to maximize impact. Thus, boot sector viruses are mostly lost to time. Malware authors moved on.
Overall, it’s a pretty inconsequential feature born of good intentions but practically speaking malware still exists in spite of it. It’s unlikely to matter to any malware you would find in the wild today. Secure boot keys get leaked. You can still get malware in your applications. Some malware even brings its own vulnerable drivers to punch into the kernel anyway and laugh in the face of your secure boot mitigation. The only thing secure boot can actually do when it works is to ensure that on the disk the boot loader and kernel look legit. I guess it kind of helps in theory.
No. You will get scammed with zero recourse.
This isn’t even necessarily for nefarious reasons. I’ve actually had a case where HR was trying to help by putting in the words that they were stupidly required to find in a resume.
Still not a good sign of a properly functioning organization.
Loads of complex code exposed to an assumed trusted network is the model of printers. They’re going to be full of security issues.
This stuff should be sandboxed and then never, ever exposed to the Internet.
Entirely personal recommendation, take it or leave it: I’ve seen and attacked enough of this codebase to remove any CUPS service, binary and library from any of my systems and never again use a UNIX system to print. I’m also removing every zeroconf / avahi / bonjour listener. You might consider doing the same.
Great advice. It would appear these developers don’t take security seriously.
I appreciate the positive and constructive outlook and for that I value your contribution. Your wife seems like she’s being the change we want to see in less-than-stellar HR departments, but I think to consider the benefits of HR from the employee POV just isn’t safe unless you’re absolutely certain where the priorities lie for your local HR team.
The phrase “cops of the company” is an even more accurate term in the sense that while some cops may actually believe in serving their community, many perhaps most do not, and trusting one is hazardous to your health. A good HR department does care about employees and the company, but how does an employee know that they have one of the good ones? I feel like this is something you don’t really know until you lean upon it such as when disagreements occur, and then either the rickety post will hold or you fall flat on your face. Me? I’m not leaning on that rickey post any more than I would willingly speak to a “friendly” neighborhood police officer. Your job isn’t a place for trust. It’s business. That HR person could be your wife, or they could be the kind to shoot first and ask questions later.
I don’t have a problem with my local PD nor do I have any issues with my HR, but I definitely don’t want a visit from either.
Getting a hernia there happens to 1 in 3 men.
Do you consider the smartphone a mature product? I really struggle to think about where it could be improved excepting of course for those things that no manufacturer wants to do anymore like expandable storage. Every day it seems like the offerings are becoming more similar than different, and as an enthusiast I find that a little disappointing.
👏👏 nicely done! Bravo!
Meanwhile, kids take hits all the time that would kill me instantly.
You die and whatever factors that lead you to not reproduce will become less common in the future.
That’s the theory anyway!
One is a requirement to be an organism. The other is a nice to have. A great many creatures simply die after reproducing, for example, which we can interpret to mean the minimum requirement has been met and anything beyond that isn’t as important, if we like to view it that way.
Forming that small person is also a bit of a chaotic and messy process involving chance errors of various kinds and variations in the way parts grew. In a sense, the person formed would never be exactly the same if you tried again with the same inputs either.
That this system works as well as it does is a miracle.
EDIT: Missing words.
True, but you gotta give Linux some slack. All of this driver work is reverse engineered. It would be so much easier if the vendor just published information about their hardware.