4
submitted 1 day ago* (last edited 1 day ago) by ptz@dubvee.org to c/music@lemmy.world

This song has been my alarm clock music since 2005 and is quite likely the only exception to "don't set your favorite song as your alarm or you'll grow to hate it"

If you prefer the Drew Carey video, gotchu fam: https://www.youtube.com/watch?v=L3wMesI8aiw

[-] ptz@dubvee.org 2 points 1 day ago

Lol, yeah. Covers pretty much all of my needs and most of my "wants". Even have a Lemmy app (web based) on there.

[-] ptz@dubvee.org 3 points 1 day ago

It's not that they're going to convince me, it's that it's annoying they keep trying (likely by management)

[-] ptz@dubvee.org 2 points 1 day ago

Thunderbird beta (email), Schildichat (Matrix), bank app, several local web apps (home assistant, etc), Mucke (music), key mapper, Aegis (totp authenticator), Organic Maps, Etar (Calendar), DAVx (contact/calendar sync), traditional T9 (keyboard), MALP and Snapcast (home audio)

[-] ptz@dubvee.org 4 points 2 days ago

Cat S22 Flip. Not without it's quirks, but I like it well enough. Had to digital detox, and it was great for that.

[-] ptz@dubvee.org 31 points 2 days ago* (last edited 2 days ago)

The problem is most apps are just low-effort web app conversions.

If only that. Web apps are relatively well sandboxed. Most dedicated apps (that should be websites) are designed to harvest as much data as they can and spam you with notifications/ads.

[-] ptz@dubvee.org 11 points 2 days ago

Not gonna lie, it was. lol. That's one of several reasons I decided to keep it as my daily driver. It's technically a smart phone, though, I just had all the smart stuff disabled for that challenge. I've since enabled those back, but it still looks enough like a dumb phone that I can convincingly bluff with it.

[-] ptz@dubvee.org 37 points 2 days ago* (last edited 2 days ago)

That's what I used to do, but a good portion of the time they'd continue their spiel to try to change my mind. Have only had to brandish the dumb phone once, but so far it's got a 100% shut down success rate.

[-] ptz@dubvee.org 119 points 2 days ago* (last edited 2 days ago)

My favorite part of the 30 day dumb phone challenge I did recently: I couldn't install your crappy app even if I wanted to.

A little over halfway through the challenge, was paying for my order at a local eatery, and the cashier started plugging their new app and rewards points and digital coupons and shit. I was like "I'm gonna stop you right there: flip phone." and pulled it out of my pocket and brandished it like I was the sheriff of Luddite-ville.

Kinda like this, but "Flip phone!"

[-] ptz@dubvee.org 182 points 2 days ago

It's the default page for a Windows Server running IIS web server.

[-] ptz@dubvee.org 22 points 3 days ago

Depending on what shape it's pressed into, kind of lol.

[-] ptz@dubvee.org 32 points 3 days ago* (last edited 3 days ago)

Can confirm 100%.

During Vista's heyday, I worked in a PC repair shop. All the ones that came in because "Vista sucks" were all Walmart specials with the bare minimum 512 MB RAM and crappy, bottom-of-the-barrel Seagate HDDs.

The thing would start thrashing as soon it booted with the default assortment of bloatware. By the time they brought it in, the HDD was in rough shape which made the thrashing even worse.

Fix was always to upgrade the RAM and, most often, replace the dying Seagate drive with a good one. Removing the bloatware helped as well once the root problems were addressed.

The UAC stuff was also annoying, but those could be tuned.

509
submitted 5 days ago by ptz@dubvee.org to c/politics@lemmy.world

The former President's plan to bring water to the California desert is, like a lot of his promises, a goofy pipe-dream.

In an apparent effort to address the pressing issue of California water shortages, Trump said the following: “You have millions of gallons of water pouring down from the north with the snow caps and Canada, and all pouring down and they have essentially a very large faucet. You turn the faucet and it takes one day to turn it, and it’s massive, it’s as big as the wall of that building right there behind you. You turn that, and all of that water aimlessly goes into the Pacific (Ocean), and if they turned it back, all of that water would come right down here and right into Los Angeles,” he said.

Amidst his weird, almost poetic rambling, the “very large faucet” Trump seems to have been referring to is the Columbia River. The Columbia runs from a lake in British Columbia, down through Oregon and eventually ends up in the Pacific Ocean. Trump’s apparent plan is to somehow divert water from the Columbia and get it all the way down to Los Angeles. However, scientific experts who have spoken to the press have noted that not only is there currently no way to divert the water from the Oregon River to southern California, but creating such a system would likely be prohibitively expensive and inefficient.

-11
2
[Deleted] (arstechnica.com)
submitted 1 week ago* (last edited 1 week ago) by ptz@dubvee.org to c/cybersecurity@sh.itjust.works

[Deleted - Didn't see it had already been posted]

69
submitted 1 week ago by ptz@dubvee.org to c/humor@beehaw.org
73

Software suppliers who ship buggy, insecure code are the true baddies in the cyber crime story, Jen Easterly, boss of the US government's Cybersecurity and Infrastructure Security Agency, has argued.

"The truth is: Technology vendors are the characters who are building problems" into their products, which then "open the doors for villains to attack their victims," declared Easterly during a Wednesday keynote address at Mandiant's mWise conference.

Easterly also implored the audience to stop "glamorizing" crime gangs with fancy poetic names. How about "Scrawny Nuisance" or "Evil Ferret," Easterly suggested.

Even calling security holes "software vulnerabilities" is too lenient, she added. This phrase "really diffuses responsibility. We should call them 'product defects,'" Easterly said. And instead of automatically blaming victims for failing to patch their products quickly enough, "why don't we ask: Why does software require so many urgent patches? The truth is: We need to demand more of technology vendors."

47

Chinese state-sponsored spies have been spotted inside a global engineering firm's network, having gained initial entry using an admin portal's default credentials on an IBM AIX server.

In an exclusive interview with The Register, Binary Defense's Director of Security Research John Dwyer said the cyber snoops first compromised one of the victim's three unmanaged AIX servers in March, and remained inside the US-headquartered manufacturer's IT environment for four months while poking around for more boxes to commandeer.

It's a tale that should be a warning to those with long- or almost-forgotten machines connected to their networks; those with shadow IT deployments; and those with unmanaged equipment. While the rest of your environment is protected by whatever threat detection you have in place, these legacy services are perfect starting points for miscreants.

216
submitted 2 weeks ago by ptz@dubvee.org to c/linux@programming.dev

After 20 years, Real-Time Linux (PREEMPT_RT) is finally -- finally -- in the mainline kernel. Linus Torvalds blessed the code while he was at Open Source Summit Europe. [...] The real-time Linux code is now baked into all Linux distros as of the forthcoming Linux 6.12 kernel. This means Linux will soon start appearing in more mission-critical devices and industrial hardware. But it took its sweet time getting here. An RTOS is a specialized operating system designed to handle time-critical tasks with precision and reliability. Unlike general-purpose operating systems like Windows or macOS, an RTOS is built to respond to events and process data within strict time constraints, often measured in milliseconds or microseconds. As Steven Rostedt, a prominent real-time Linux developer and Google engineer, put it, "Real-time is the fastest worst-case scenario." He means that the essential characteristic of an RTOS is its deterministic behavior. An RTOS guarantees that critical tasks will be completed within specified deadlines. [...]

So, why is Real-Time Linux only now completely blessed in the kernel? "We actually would not push something up unless we thought it was ready," Rostedt explained. "Almost everything was usually rewritten at least three times before it went into mainline because we had such a high bar for what would go in." In addition, the path to the mainline wasn't just about technical challenges. Politics and perception also played a role. "In the beginning, we couldn't even mention real-time," Rostedt recalled. "Everyone said, 'Oh, we don't care about real-time.'" Another problem was money. For many years funding for real-time Linux was erratic. In 2015, the Linux Foundation established the Real-Time Linux (RTL) collaborative project to coordinate efforts around mainlining PREEMPT_RT.

The final hurdle for full integration was reworking the kernel's print_k function, a critical debugging tool dating back to 1991. Torvalds was particularly protective of print_k --He wrote the original code and still uses it for debugging. However, print_k also puts a hard delay in a Linux program whenever it's called. That kind of slowdown is unacceptable in real-time systems. Rostedt explained: "Print_k has a thousand hacks to handle a thousand different situations. Whenever we modified print_k to do something, it would break one of these cases. The thing about print_k that's great about debugging is you can know exactly where you were when a process crashed. When I would be hammering the system really, really hard, and the latency was mostly around maybe 30 microseconds, and then suddenly it would jump to five milliseconds." That delay was the print_k message. After much work, many heated discussions, and several rejected proposals, a compromise was reached earlier this year. Torvalds is happy, the real-time Linux developers are happy, print_K users are happy, and, at long last, real-time Linux is real.

423
submitted 3 weeks ago* (last edited 2 weeks ago) by ptz@dubvee.org to c/fediverse@lemmy.world

Over the past 5-6 months, I've been noticing a lot of new accounts spinning up that look like this format:

  • https://instance.xyz/u/gmbpjtmt
  • https://instance.xyz/u/tjrwwiif
  • https://instance.xyz/u/xzowaikv

What are they doing?

They're boosting and/or downvoting mostly, if not exclusively, US news and politics posts/comments to fit their agenda.

Edit: Could also be manipulating other regional news/politics, but my instance is regional and doesn't subscribe to those which limits my visibility into the overall manipulation patterns.

What do these have in common?

  1. Most are on instances that have signups without applications (I'm guessing the few that are on instances with applications may be from before those were enabled since those are several months old, but just a guess; they could have easily just applied and been approved.)
  2. Most are random 8-character usernames (occasionally 7 or 9 characters)
  3. Most have a common set of users they're upvoting and/or downvoting consistently
  4. No posts/comments
  5. No avatar or bio (that's pretty common in general, but combine it with the other common attributes)
  6. Update: Have had several anonymous reports (thanks!) that these users are registering with an @sharklasers.com email address which is a throwaway email service.

What can you, as an instance admin, do?

Keep an eye on new registrations to your instance. If you see any that fit this pattern, pick a few (and a few off this list) and see if they're voting along the same lines. You can also look in the login_token table to see if there is IP address overlap with other users on your instance and/or any other of these kinds of accounts.

You can also check the local_user table to see if the email addresses are from the same provider (not a guaranteed way to match them, but it can be a clue) or if they're they same email address using plus-addressing (e.g. user+whatever@email.xyz, user+whatever2@emai.xyz, etc).

Why are they doing this?

Your guess is as good as mine, but US elections are in a few months, and I highly suspect some kind of interference campaign based on the volume of these that are being spun up and the content that's being manipulated. That, or someone, possibly even a ghost or an alien life form, really wants the impression of public opinion being on their side. Just because I don't know exactly why doesn't mean that something fishy isn't happening that other admins should be aware of.

Who are the known culprits?

These are ones fitting that pattern which have been identified. There are certainly more, but these have been positively identified. Some were omitted since they were more garden-variety "to win an argument" style manipulation.

These all seem to be part of a campaign. This list is by no means comprehensive, and if there are any false positives, I do apologize. I've tried to separate out the "garden variety" type from the ones suspected of being part of a campaign, but may have missed some.

[New: 9/18/2024]: https://thelemmy.club/u/fxgwxqdr
[New: 9/18/2024]: https://discuss.online/u/nyubznrw
[New: 9/18/2024]: https://thelemmy.club/u/ththygij
[New: 9/18/2024]: https://ttrpg.network/u/umwagkpn
[New: 9/18/2024]: https://lemdro.id/u/dybyzgnn
[New: 9/18/2024]: https://lemmy.cafe/u/evtmowdq
https://leminal.space/u/mpiaaqzq
https://lemy.lol/u/ihuklfle
https://lemy.lol/u/iltxlmlr
https://lemy.lol/u/szxabejt
https://lemy.lol/u/woyjtear
https://lemy.lol/u/jikuwwrq
https://lemy.lol/u/matkalla
https://lemmy.ca/u/vlnligvx
https://ttrpg.network/u/kmjsxpie
https://lemmings.world/u/ueosqnhy
https://lemmings.world/u/mx_myxlplyx
https://startrek.website/u/girlbpzj
https://startrek.website/u/iorxkrdu
https://lemy.lol/u/tjrwwiif
https://lemy.lol/u/gmbpjtmt
https://thelemmy.club/u/avlnfqko
https://lemmy.today/u/blmpaxlm
https://lemy.lol/u/xhivhquf
https://sh.itjust.works/u/ntiytakd
https://jlai.lu/u/rpxhldtm
https://sh.itjust.works/u/ynvzpcbn
https://lazysoci.al/u/sksgvypn
https://lemy.lol/u/xzowaikv
https://lemy.lol/u/yecwilqu
https://lemy.lol/u/hwbjkxly
https://lemy.lol/u/kafbmgsy
https://discuss.online/u/tcjqmgzd
https://thelemmy.club/u/vcnzovqk
https://lemy.lol/u/gqvnyvvz
https://lazysoci.al/u/shcimfi
https://lemy.lol/u/u0hc7r
https://startrek.website/u/uoisqaru
https://jlai.lu/u/dtxiuwdx
https://discuss.online/u/oxwquohe
https://thelemmy.club/u/iicnhcqx
https://lemmings.world/u/uzinumke
https://startrek.website/u/evuorban
https://thelemmy.club/u/dswaxohe
https://lemdro.id/u/efkntptt
https://lemy.lol/u/ozgaolvw
https://lemy.lol/u/knylgpdv
https://discuss.online/u/omnajmxc
https://lemmy.cafe/u/iankglbrdurvstw
https://lemmy.ca/u/awuochoj
https://leminal.space/u/tjrwwiif
https://lemy.lol/u/basjcgsz
https://lemy.lol/u/smkkzswd
https://lazysoci.al/u/qokpsqnw
https://lemy.lol/u/ncvahblj
https://ttrpg.network/u/hputoioz
https://lazysoci.al/u/lghikcpj
https://lemmy.ca/u/xnjaqbzs
https://lemy.lol/u/yonkz

Edit: If you see anyone from your instance on here, please please please verify before taking any action. I'm only able to cross-check these against the content my instance is aware of.

19
submitted 3 weeks ago* (last edited 3 weeks ago) by ptz@dubvee.org to c/android@lemmy.world

Android updates are undergoing a revolution as we speak. Is it a positive thing, though? We will see. Google’s focus on N+3 for everyone might make it more common for OEMs to provide 2 or 3 platform updates, but on the other hand, in the cases where they want to provide more updates than it’s expected of them it gets way more complicated than before. It might also cause a feature stagnation, stripping users of useful improvements.Where is Google leading us? I don’t know, but I think we will find out very soon.


I was doing some research on putting a custom GSI ROM on an older device and stumbled on this article. It's from 2022, but should still be accurate.

If you've ever wondered about how Android updates work and why some devices seemingly have arbitrary cutoff points for updates, this article explains why.

I won't spoil the read, but things are actually better than they used to be with one glaring regression in the form of GRF (Google Requirement Freeze)

33
submitted 1 month ago* (last edited 1 month ago) by ptz@dubvee.org to c/linux@programming.dev

Putting together a new Linux HTPC build and looking for a 10ft UI WM/DE to use with it. Essentially, it would be a launcher for a few PWAs (Emby, Netflix, etc) as well as Steam and maybe some emulators. Navigation would likely be a wireless keyboard and, if absolutely necessary, mouse (goal is to get a bluetooth remote working and use that, but that's the next phase).

I haven't used Kodi since it was still Xbox Media Center (running on an actual Xbox lol), but would it be a good choice? I used it forever ago as the dashboard for my modded Xbox, and it was great. However, for this, I'd rather not run Kodi, if possible, since Emby already covers those use-cases.

If there's no "dedicated" one, any recommendations for which regular DE might be best modifiable/extendable to work for that purpose?

14
submitted 1 month ago* (last edited 1 month ago) by ptz@dubvee.org to c/humanities@beehaw.org

Jazmin Jones knows what she did. "If you're online, there's this idea of trolling," Jones, the director behind Seeking Mavis Beacon, said during a recent panel for her new documentary. "For this project, some things we're taking incredibly seriously ... and other things we're trolling. We're trolling this idea of a detective because we're also, like,ACAB." Her trolling, though, was for a good reason. Jones and fellow filmmaker Olivia Mckayla Ross did it in hopes of finding the woman behind Mavis Beacon Teaches Typing. The popular teaching tool was released in 1987 by The Software Toolworks, a video game and software company based in California that produced educational chess, reading, and math games. Mavis, essentially the "mascot" of the game, is a Black woman donned in professional clothes and a slicked-back bun. Though Mavis Beacon was not an actual person, Jones and Ross say that she is one of the first examples of Black representation they witnessed in tech. Seeking Mavis Beacon, which opened in New York City on August 30 and is rolling out to other cities in September, is their attempt to uncover the story behind the face, which appeared on the tool's packaging and later as part of its interface.

The film shows the duo setting up a detective room, conversing over FaceTime, running up to people on the street, and even tracking down a relative connected to the ever-elusive Mavis. But the journey of their search turned up a different question they didn't initially expect: What are the impacts of sexism, racism, privacy, and exploitation in a world where you can present yourself any way you want to? Using shots from computer screens, deep dives through archival footage, and sit-down interviews, the noir-style documentary reveals that Mavis Beacon is actually Renee L'Esperance, a Black model from Haiti who was paid $500 for her likeness with no royalties, despite the program selling millions of copies. [...]

In a world where anyone can create images of folks of any race, gender, or sexual orientation without having to fully compensate the real people who inspired them, Jones and Ross are working to preserve not only the data behind Mavis Beacon but also the humanity behind the software. On the panel, hosted by Black Girls in Media, Ross stated that the film's social media has a form where users of Mavis Beacon can share what the game has meant to them, for archival purposes. "On some level, Olivia and I are trolling ideas of worlds that we never felt safe in or protected by," Jones said during the panel. "And in other ways, we are honoring this legacy of cyber feminism, historians, and care workers that we are very seriously indebted to."

You can watch the trailer for "Seeking Mavis Beacon" on YouTube.

I had no idea "Mavis Beacon" wasn't a real person until well after graduating college.

view more: next ›

ptz

joined 1 year ago