

Yep.
Rather than try to single-handedly re-engineer an old protocol to be secure, I just use it for stuff where security isn’t a big deal. Including messages with links to secure resources (and send credentials via a separate system).
Yep.
Rather than try to single-handedly re-engineer an old protocol to be secure, I just use it for stuff where security isn’t a big deal. Including messages with links to secure resources (and send credentials via a separate system).
I don’t see how you wouldn’t have your email on an email providers servers - that’s how email works. You send an email via a provider, they forward it to the destination address you’ve included with the email.
That destination address is another email provider’s server, which holds it until the receiver connects and downloads it. Email is a store-and-forward system, designed at a time when users weren’t always connected. It still works this way.
Email is old, so the fundamental mechanics are pretty simple, and encryption wasn’t an option at the time - so it’s sent in the clear. Otherwise it would require both sender and receiver (either at both ends, or the servers) to agree on an encryption to use.
At idle, SSD is usually better (like you said if the SSD has proper power management, and that takes research to know).
Spinning platters are generally still better for power per gig/terabyte, because write time they consume less power than SSD.
I dont really look at drive power consumption, because even with ~10 drives running in my environment, a single cpu doing anything moderate blows away their power consumption numbers (I’ve tested, not that it was needed, heat dissipation alone makes it clear).
I have a ten-year old 5 drive NAS that runs 24/7, and it’s barely above room temp. Average draw is a few watts (the number was so low I put it out of my mind, maybe 5 watts - Raspberry Pi territory).
My SFF desktop is 12w at idle, with either 2 small SSDs (500GB each) or a single large drive (12TB). So much for SSD having better idle power.
SSD isn’t necessarily less energy hungry than spinning platter.
It really depends on the specific units and use patterns.
Generally SSD has better idle power, and HD has better read and write power, but that doesn’t even always hold true.
If your device sits idle long enough, SSD is better for power, but the write time to get to idle could easily consume the power differential.
https://www.edn.com/power-vs-energy-ssd-and-hdd-case-studies/
Beat me to it. I always have the page up.
You’re not wrong!
I’m a fan of the martini - when I’m in the mood to drink. But make it gin, a good one like Boodles or some of the new stuff with citrus notes.
Another good shower thought today!
Scans for open ports run continuously these days.
Ten years ago I opened a port for something for a couple days - for months after that I was getting regular scans against that port (and others).
At one point the scans were so constant it was killing my internet performance (poor little consumer router had no defense capability).
I don’t think the scans ever fully stopped until I moved. Whoever has that IP now probably gets specifically scanned on occasion.
And just because you don’t run a business doesn’t mean you have nothing to lose.
DMZ should be enough… But routers have known flaws, so I’d be sure to verify whatever I’m using.
Finally, a real shower thought!
Why wouldn’t it be possible?
The phone is providing the client app connection, you just need an interface from the client to the POTS system, or just the hardware you’re using as a phone.
Years ago I had a cordless phone that connected to the Skype client on a pc - you could call a phone number, or a Skype contact with it.
This is no different - you just need to establish the interface between the hardware and software.
That’s insightful.
I’d wondered why other PDF apps came on the market in the mid 2000’s.
Ah hell, I don’t know anything about it, but figured I’d go ahead and download it to watch later.
Account? What account
Shame that.
As someone else said, Prevent is also an option (which would include backup in my opinion).
Though backups can get encrypted too, if it’s not setup to prevent this.
Prevent, in my opinion, is the path.
Yea, would’ve been a lot better if they demonstrated how someone could be tracked by the cell modem that many cars have had since the early 2000’s.
Or even a MITM for that part, showing how a few vendors security is weak (I bet most have nominal security).
Buried deep in the article:
Hackers stole admin credentials for these devices.
So, yea, you have the creds, you can modify the OS any way you want.
It wasn’t because the devices were EOL (as implied in the beginning of the article), it’s because of poor credential management.
I recently went to buy tickets to see a stage play at a local community theater. Turns out last play I saw there was 15 years ago.
Wtf? Why do you have info on an account I haven’t logged into in 15 years?
Until there’s real fines for data loss, these companies won’t change. Hell, for all I know they have friends in the dark web/hacker world and “leak” credentials to them.
The violation they target users for is sharing a video, and that’s usually through a file sharing service like torrenting.
Think of it this way - whatever you watch online via a browser you’re already downloading. Or via an app.
You know, it really tweaks me that torrenting is associates with piracy, when it could’ve become the defacto way to share files between users, if OS devs had just included the protocol in the OS (looking at you Android, but Windows and Apple too).
I’ve often questioned why it wasn’t…
Still, they don’t control it. Which means support is a real problem.
They’re not even paying for a service, which would give you contractual commitments.
It’s a shame, really.
Back in my restaurant days, hanging out after and getting loose really made everyone work together better.
Though I can’t see doing this in a business environment - it’s just not the same.