What I did was just buy the tv I wanted for the hardware and block it from internet access by Mac address, then plugged it into the network with eth. I then put dns blocks on every request it made (I log things before blocking them, and did this on the scenario a kill switch gets messed up or something) and installed the media software from there. Smart tv made private.
Mikelius
I for one hate Microsoft Windows a great amount, yet am in love with C#... Just because a company has one terrible product, doesn't mean everything they make is terrible.
Also... What everyone else here already said. No reason for me to rinse and repeat what's been said lol.
Man, still need to go finish the 2nd. I stopped playing after a game breaking bug was encountered that was never fixed... Didn't want the start the entire chapter over and never got back into it to finish it. Once I do eventually do that, I might get the 3rd when it releases.
Who knows, guess we'll find out. The only point I was trying to make is the title of the article being misleading to an assumption rather than fact. It's very possible what you just mentioned is the case, but we won't know until later. My personal concern is the fact Zoom is used for work for many and getting around that for most folks will be the hard part. I hope the terms for free users vs business agreements differ.
96% but it's not accurate. Verified on my DNS logs that the two it claimed weren't blocked, actually resolved to 0.0.0.0 correctly, so I'm actually at 100%
Title probably needs to be reworded. Terms clearly mention they won't use it without user consent, not that they MUST use it. Doesn't mean it'll stay that way, but just don't consent for it when asked and you're probably okay (I'm mentioning this for those who have no choice but to use it, for things like work)
If you have geolocation enabled or don't block location requests, that could be another way. VPN can't protect you from geolocation.
Why not just self host? What happens when/if their service goes down without any warning? You lose everything?
Got my things all on a server with RAID for redundancy and backup weekly to an external (encrypted) device, monthly to another that doesn't stay at home. Also means I don't have to rely on the Internet to use all my services if the ISP goes down, the firewall explodes, etc. Self hosting is the way to go!
Edit: autocorrect being annoying
Again, no Ubuntu expert here, so do this at your own risk (someone jump in and say this is a bad idea if it is). Not irreversible as you can just revert what I'm telling you via live CD, but just wanted to leave the warning.
If uname -r
shows the old kernel *-24, and grub update is choosing that instead of *-25, perhaps Ubuntu relies on the last change/created date or something weird. What you can check is if *-24 AND *-25 show up in /usr/src. If both are there, do (as root/sudo): mv /usr/src/*6.2.0-24* /root
. Now run grub-update
again. I think it should tell you which version it chose for the boot menu.
Next try: grep 6.2.0 /boot/grub/grub.cfg
to verify you see the new version.
- If you see it, reboot and see if it starts with it. If you can't boot, go through the liveCD and move that directories back to /usr/src, chroot to the drive (see https://www.turnkeylinux.org/docs/chroot-to-repair-system for how to do this properly), and after chrooting, run
grub-update
again. - If you don't see it or get nothing back from grep, move the directory back and re-run
grub-update
to avoid not being able to boot back in. This wasn't the fix we were hoping for.
^ this is all assuming Ubuntu puts its kernels in /usr/src and uses that location as reference to what's available/installed. If you see nothing there, then something else will need to be attempted
Edit 2: another thing to check is if the compiled kernels are in /boot. Basically follow the same instructions above but use /boot/*-24 instead. This might actually be what needs to be done now that I think about it, not necessarily /usr/src.
I don't, but that's because of how I have things setup around the network. While most people here say it's because they don't need it, I am in a position that I need SOMETHING simply because others in the household could bring in malware and rather than trust them to make smart decisions, I proactively monitor all network activity for anything unusual. That being said, I have clamAv installed and run a weekly scan, but my real "antivirus solutions" are as follows: A syslog server that's connected to grafana/MySQL and alerts me based on very specific criteria. Along this, I've got my network firewall configured to block all "untrustworthy countries" in and out 100%, as well as use an IDS/IPS (also connected to syslog for alerts). Lastly, an internal DNS which grabs from like 20 sources that include some reliable lists with malware domains and such, and a custom list of my own that I add to as useful security news feeds hit my RSS feed with urls in their blog posts.
Actually got a list of other things going on in the network to make it even more secure, but just wanted to list the main things that'll give you a step up in the anti-malware front.
None of this is buletproof without proper care for how you use the Internet, though.
- Check for router/modem/firewall updates weekly if they can't be auto updated
- never click any links in an email even if you feel you know you trust it (exception to this would be something you KNOW is coming into your inbox, such as an account registration verification)
- avoid tiny urls or suspicious looking urls when possible
- don't open ports unless you really really really know what you're doing. If you absolutely need to open a port, then for the love of god define the source IP address/CIDR. Opening ports to the world includes opening them to cyber criminals
- turn off upnp, I don't care what that game or service you use says, it doesn't need it
You get the idea. My message got way too long and turned into a rant lol.
Have you tried a normal "grub-update" command to make sure it gets the right kernel to boot up for you? Not 100% familiar with Ubuntu, but perhaps that's all you'd need to run to get it booting to the right version.
Just gave it a try... Doesn't appear to work for browser default search settings? I do a search and see results for about 2 seconds before it then shows their search page. I used
https://www.qwant.com?q=%s
for the query. Liked the search results I tested it with but not being able to use the search bar for quick searches is a deal breaker for me :(