Grunt4019

joined 1 year ago
[–] Grunt4019@lemm.ee 1 points 8 months ago

I feel like this applies more to flaws in how studies are published and the incentives surrounding that more than the scientific method.

[–] Grunt4019@lemm.ee 3 points 9 months ago

Hmmm that might be the culprit, I will try that, thanks!

[–] Grunt4019@lemm.ee 9 points 9 months ago (2 children)

I think visually it might say the selected hz in my case 144. But I can tell that in practice it is not at 144. If I disable the other monitors only then does it actually go to 144. I’m not sure if I have a config issue, but I thought this was expected behavior from X11.

[–] Grunt4019@lemm.ee 17 points 9 months ago (5 children)

I’m just annoyed with my multiple monitors on X11 one of them supports 144hz but since the others are 60hz x11 forces 60hz on all monitors.

[–] Grunt4019@lemm.ee 1 points 9 months ago (1 children)

If you must expose to the net (which you may do with the games servers) then again, the config guide has you covered, use crowdsec, use https, use random ports, use strong passwords and mfa.

When you say the config guide has you covered. Where is this config guide?

[–] Grunt4019@lemm.ee 19 points 9 months ago

I feel like this video is preaching to the choir. No one who is not already concerned about their digital privacy will care about this video, and if they watch it I doubt it would change their minds.

[–] Grunt4019@lemm.ee 6 points 9 months ago (1 children)

I’m pretty sure that if you had not already been signed in, you would not have been able to use it. As the login page requires an internet connection.

[–] Grunt4019@lemm.ee 3 points 9 months ago

I feel like fromsoft games in general like to be intentionally obtuse.

[–] Grunt4019@lemm.ee 4 points 10 months ago

Seriously, there needs to be an article when we find out that they DON’T collect something.

[–] Grunt4019@lemm.ee 7 points 11 months ago (1 children)

What do you use for scanning for paperless?

[–] Grunt4019@lemm.ee 20 points 11 months ago (1 children)

that the suspect met on the dating section of porn site xHamster

Not related to the issue at hand, but do people really use dating sections of porn sites?

[–] Grunt4019@lemm.ee 7 points 11 months ago

There is a remote vector as well beyond just physical access.

There are several ways to exploit LogoFAIL. Remote attacks work by first exploiting an unpatched vulnerability in a browser, media player, or other app and using the administrative control gained to replace the legitimate logo image processed early in the boot process with an identical-looking one that exploits a parser flaw. The other way is to gain brief access to a vulnerable device while it’s unlocked and replace the legitimate image file with a malicious one.

view more: ‹ prev next ›