• 9 Posts
  • 52 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle


  • Or it explodes into a mess of related things and you end up researching 20 different ways / things that would combine well with it without accomplishing anything in the end. Except occasionally having people ask: “How do you know so many things?”

    Disclaimer: I don’t have ADHD according to the doc because I should have had more problems with it in school. More than just getting bullied. She refuses to send me to an institute where they might think I have ADHD, because she doesn’t trust their judgement.

    Props to my (officially autistic) girlfriend for basically becoming an ADHD psych and helping me structure my life and get things done.







  • F04118F@feddit.nlto196@lemmy.blahaj.zoneCorporations Rule
    link
    fedilink
    arrow-up
    19
    ·
    edit-2
    14 days ago

    I feel your pain, that absolutely sucks.

    But I also feel Schadenfreude for the company: refusing to hire a dev because they are autistic is just hilariously incompetent HR.

    If you exclude autists, ADHD, trans people and furries, the only thing that has a severe disability is your company’s IT skills hahaha


  • I bet that 1234 is used more often because of the 4-character minimum, like PIN codes on debit cards. It’s 4 characters so it’s safe. 123, on the other hand, is not safe, because it is 3 characters. /s

    My solar inverter admin interface has a certain 4-digit password. So I wanted to change it to secure it, and found out that it only allows 4-digit passwords. Luckily the access point can be set up with a higher entropy password though (it is constantly advertised and had a very “secure” 8-digit password by default, I think you can guess which one)







  • Steam Deck and Linux desktop user here.

    I wouldn’t prioritize a native Linux binary if I were you. For some of my games that have a native Linux version, I still run the Proton compatibility version instead because it runs better. Proton is insanely well-optimized and adapted to Linux desktops, your own code will have a hard time competing with that.

    Just make sure to pick an engine / tech stack that works well with Proton and find one or more testers who run SteamOS or another Linux distribution.



  • You keep using the word “maintenance”. All I’m worried about is not installing any security patches for months.

    The problem that I tried to highlight with my “cherry picking” is:

    • Running a machine with open vulnerabilities for which patches exist also “paints a target on your back”: even if your data is worthless, you are essentially offering free cloud compute.
    • But mostly, a single compromised machine can be an entrypoint towards your entire home network.

    So unless you have separated this Orange Pi into its own VLAN or done some other advanced router magic, the Orange Pi can reach, and thus more easily attack all your other devices on the network.

    Unless you treat your entire home network as untrusted and have everything shut off on the computers where you do keep private data, the Orange Pi will still be a security risk to your entire home network, regardless of what can be found on the little machine itself.


  • No it is

    https://www.pandasecurity.com/en/mediacenter/consequences-not-applying-patches/

    And:

    You’re allowing for more attack vectors that would not be there if the system were to be patched. Depending on the severity of the vulnerability, this can result in something like crashes or something as bad as remote code execution, which means attackers can essentially do whatever they want with the pwned machine, such as dropping malware and such. If you wanna try this in action, just spin up a old EOL Windows machine and throw a bunch of metasploit payloads at it and see what you can get.

    While nothing sensitive may be going to or on the machine (which may seem to be the case but rarely is the case), this acts as an initial foothold in your environment and can be used as a jumpbox of sorts for the attacker to enumerate the rest of your network.

    And:

    Not having vulnerability fixes that are already public. Once a patch/update is released, it inherently exposes to a wider audience that a vulnerability exists (assuming we’re only talking about security updates). That then sets a target on all devices running that software that they are vulnerable until updated.

    There’s a reason after windows Patch Tuesday there is Exploit Wednesday.

    Yes, a computer with vulnerabilities can allow access to others on the network. That’s what it means to step through a network. If computer A is compromised, computer B doesn’t know that so it will still have the same permissions as pre-compromise. If computer A was allowed admin access to computer B, now there are 2 compromised computers.

    From https://www.reddit.com/r/cybersecurity/comments/18nt1o2/for_individuals_what_are_the_actual_security/