+1 on that. The User’s guide of a similar device (source) mentions a 10-pin CPLD connector Reserved for IBM use
+1 on that. The User’s guide of a similar device (source) mentions a 10-pin CPLD connector Reserved for IBM use
I’ve seen a few people with PhD who want to be developers being put into management roles, getting quite unhappy.
That said, if this type of PhD clearly communicates they want to be developers, the often still get jobs, maybe with lower pay compared to the manager but a bit higher pay compared to the developer
Therefore they need ventilators
Wow, that’s an impressive list of amateur tanks. Do they also sell real cars in the US? (Rhetorical question)
You need a phone, tablet, or other device that’s been rooted.
😦
Mars also does not have water. This explains why they didn’t care to properly protect the metal from rust I guess
I guess that is why Etterra is betting on it. Maybe to motivate another Darwin Award winner.
Yes, its weight is absolutely ridiculous. The other hobbyist’s tanks you mentioned are too. Just because there is more of the same (minus razor sharp edges and rust), doesn’t mean it isn’t sh*t too.
Syncthing on Android has an option to only sync when on AC battery. The PC client might have a similar option. If not, you could probably configure something similar via systemd or udev under Linux.
I don’t think syncthing has proper means to synchronize contacts or anything else that’s not file-based though.
I use syncthing and prefer it for synchronizing files between my devices.
Does the add-on work the same way in Chrome? Or does Google break it in a way similar to uBlock Origin with the WebExtensions v3 update?
Is this all true for addons available from Mozilla’s add-on site?
PS: Mozilla had to limit installing addons because lots of companies installed malicious addons into browsers of their users, often without knowledge or informed consent of their users.
Once again, it’s mostly about the money
Do you have evidence or is this pure speculation?
How and why should Mozilla get money from Russia? Isn’t it more plausible if Russia were blackmailing Mozilla?
I think we should not expect a volunteer (or small group of volunteers) to keep up with a billion dollar company
Yeah, that’s a very useful exception.
Operator overloading is adding complexity, making code subtly harder to read. The most important lesson for code is: It should primarily be written to be easy to read by humans because if code is not trash, it will be read way more often than written.
If it is just the location, then it could be spoofed.
If it is something that requires physical presence, then you need both devices to communicate with each other. If it is not done via QR code (like some online banking do), then both devices need to be connected, e.g. via WiFi or Bluetooth. In this case, if an attacker controls one of the devices (that’s the class of attacks 2FA should prevent you from), the attacker probably controls both devices. So what’s the point then?
I guess if there is WiFi, he won’t even need a mobile data plan, so he could safe lots of money.
How would MS Authenticator make it any better than TOTP?
To break TOTP, the attacker would need to:
a) be able to observe the initial exchange of the TOTP secrets. To do that, the attacker needs access to the victim’s computer (on user level) at that specific time they set up TOTP. TOTP is a TOFU concept and thus not designed to protect against that. However, if the attacker controls the victim’s computer at that time, the victim is screwed anyways even before setting up 2FA.
b) have access to the TOTP app’s secret storage and to the victim’s login credentials (e.g. by phishing). If the attacker can gain that level of access, they would also have access to the Microsoft Authenticator’s secret storage, so there is no benefit of the Microsoft app.
On the other hand, Microsoft Authenticator is a very huge app (>100MB is huge for an authenticator app, Aegis is just 6MB, FreeOTP+ 11MB), i.e. it brings a large attack surface, especially by connecting to the internet.
I don’t think Microsoft Authenticator brings security benefits over a clean and simple TOTP implementation.
If it is just TOTP, you can use any other TOTP app, such as Aegis or FreeOTP+.
And no, Microsoft cannot be trusted on not doing anything bad. The app is full of trackers and has an excessive list of permissions it “requires”.
For comparison, Aegis and FreeOTP+ work without trackers and way less permissions.
Microsoft has a long track record of leaks. Just naming the 2 most prominent:
Same question on reddit a while ago
As suggested there, I recommend to use a multimeter to identify the power socket pins. Roughly half of them should be ground. Most or all of them should correspond and be connected to the SATA power connector pins on the other side.