Two RJ ports on a laptop? Some of us are lucky to get one!
Two RJ ports on a laptop? Some of us are lucky to get one!
@kurcatovium@lemm.ee
Trojan is any malware that pretends to be a legit program. It does not need to have backdoor or info stealing capability even though most malware (trojan or not) today does. For example, pre-Internet trojans might just invisibly install themselves along the actual program they were bundled with and then nuke the system on a certain date. Antivirus companies would even advance the date on their systems in hopes of detecting these and being the first to develop a patch.
But since this program is not malicious, it just straight up hogs system resources and/or crashes it due to a mistake, it cannot be considered malware and therefore not a trojan.
Certain Intel processors from around 2000 would crash everything when loading the 4 bytes F0 0F C7 C8
into a specific register. Would you consider this a backdoor because it allows any program to crash the system? I wouldn’t say so, crashing Windows 98 was probably not too hard anyway…
I installed FakeStore and set the app’s installed_by
* property from Package Manager to FakeStore (com.android.vending
, the same as Google Play Store), which was enough to fool the public transport app I’m using. Is this the workaround you’re talking about, or does it require MicroG too?
* Not what it’s actually called, can’t remember that
It’s the apps that prevent themselves being sideloaded. Presumably, their devs will enact similar policy on EU iOS too.
It was advertised as “2 TB (64 GB Extended)” at a local clearance sale (not AliExpress), which was basically correct though I would prefer “64 GB but misprogrammed so everything can get corrupted at any time”. When buying it, I didn’t yet know if I could reprogram the chip but the low price was justified for the pretty aluminum case with a USB-C port and place for a custom PCB. I decided to buy it also to prevent another, less technical person from using it and losing their data. The store was getting rid of inventory for very cheap and would close soon so no more fake drives would be ordered.
Well, depends on how much you’re OK with some problems. I knowingly bought a “2 TB (64 GB Extended)” flash drive, tested its sectors and reprogrammed it to 32-in-64-GB for wear leveling and bad sector avoidance because it was still a cheap 32GB USB drive. I made sure to label it for “non-critical use” such as movies.
As for camping lanterns, ones charged from mains might have a nasty habit of shocking their users. (The YouTube channel contains a huge number of cheap Chinese charger teardowns and most don’t meet safety criteria. Usually, there is just 1 or 2 layers of thin tape between mains and the output you can touch.)
Sometimes, counterfeits or unknown brands are so similar to the real deal that it barely matters. I’d say that basic electronics (alarm clocks, kitchen scales, calculators, SD security cams) or even RAM is fine. With appropriate expectations, parts like video or USB cables, hubs etc., small home improvement items (hooks, screws) are fine too. Avoid categories where a lot of items have fake specs (storage devices, LED bulbs, anything that claims a runtime on a Li-Ion battery). Power electronics (especially if using mains or non-tiny Li-Ion batteries) can be downright dangerous. For novelty items and electronics modules, it’s usually easy to find text or video reviews on other websites because they’re easy to uniquely describe. Remember to consider ways in which the product can be utter crap despite high reviews citing good first impressions; it also helps to have practical knowledge of testing the properties of the items and fixing common issues.
Well, then you’re going to hear
most of the time, much like Spotify.
(Last time I was in a Spotify-“enhanced” waiting room was 6 years ago so no idea if that still holds.)
Well, this is how a large part of how carbon credits “work”. You can pay someone to not cut down their tree, for example, and get a certificate in return. However, the demand for wood will likely just get satisfied elsewhere and there is little stopping people from selling multiple carbon credits per tree, or just including trees that would not get cut down anyway.
In the best case scenario, actual carbon gets stored so that it won’t decompose (like dead trees or other biomass in oxygen, maybe even plastic someday) or burned (like coal that future people can reach); however, that’s energy-intensive (hydrocarbons release energy when turned into oxides and vice versa) and difficult. Obviously, such carbon credits are expensive and they would probably cost an airline as much as fuel for your flight. Sealing an oil reservoir instead of using it, as I suggest, would be the easiest way to effectively accomplish this but oil producers don’t want to miss out on the fields they operate.
Unless the “carbon neutral” option for your flight ticket is a large percentage of its price, they are probably using dubious carbon credits - in the typical case, they are like saying your crypto mining rig is zero-emission because it’s next to an existing hydroelectric dam. The energy from that could have been used to offset some carbon-intensive production elsewhere (unless all your energy demand is already satisfied by clean electricity and you cannot export, like Iceland some islands).
At worst, it’s a pure scam that offsets no carbon and is pushed by Big Oil to prevent buyers from considering systemic changes to their carbon-heavy operation.
Edit: Iceand indeed has an overproduction of clean energy and they use it to extract and export aluminum, which is energy-intensive. Still, as long as there are gas furnaces and combustion engines on the island, there is room for improvement. However, small tropical islands (which cannot host aluminum factories) mostly use solar panels and some storage solution, and computationally heavy tasks are a legitimate use for any excess electricity production.
US and Russia are the only countries exempt from the ban on new territorial claims under the UN Antarctic Treaty. Drilling is also banned but thanks to carbon credits, you don’t need to drill to monetize oil: you just need to threaten that you will.
“You know us: we have violated international law before. You can pay us $5/ton to leave some of the oil behind on the off-chance that we do it again. New low for carbon credits!”
…,And Cloudflare will request using it for 5 seconds every time you visit a website hosted with them. I wonder how much crypto they’ve accumulated this way already.
Radian-only chad
Input devices almost never use USB 3.0. In fact, most manufacturers save money and don’t shield the cable, forcing half-speed USB 1.1, which is enough for all mice and keyboards - less than 50 kb/s of the available 6 Mb/s is required even for 240Hz polling. High-end mice might have USB 3.0 (9 pins instead of 4 in the plug) but there should be no practical difference between 3.0 and 2.0 speeds. The polling rate will most likely be identical and the microsecond difference between how long each takes to transfer the data is likely way lower than lag from the mouse’s wireless connection.
Just use any USB 2.0 hub, even $2 ones from AliExpress will work the same as high-end ones. Most are sold with 4 ports because that’s what their standard generic chip does. You probably have one lying around or built into the monitor. You’re unlikely to cause interference so just choose any spot with strong signal to the desk area, not necessarily line-of-sight: if the mouse works everywhere within 2 meters from the intended area, then the intended area will have good signal and minimal chance of dropout. The lag or polling rate does not decrease with signal strength unless you count extra nanoseconds the radio waves need to travel.
The only difference is when you need another port for high-speed applications such as mass storage devices or MTP with your phone, at which point just plug them directly into the PC for max speed.
Finally implementing something pirates have taken for granted since the first digital cross-platform audio file format (1983?)
deleted by creator
I’d guess they had found a pole that had its top sawed off by somebody who wanted access, and got the idea for this post, arranging it to make the apparent protrusion without photo editing.
…Like MS-DOS getting open sourced. It’s pretty much worthless unless you need to use some really old device.
The Earth is not infinite though. If the walls are smooth and indestructible and there is no air resistance, you’d reach the other side in about 40 minutes and briefly stop, allowing you to climb out on the other side with some agility.
That’s why I didn’t specify which kind. I knew some laptops had a DSL or dial-up modem inside for use with any telephone sockets on the go.