Boo hoo, I need a TPM, recent SIMD instructions, and DirectX12 support to be able to boot. Please help!
Boo hoo! 🎻
This is a secondary account that sees the most usage. My first account is listed below. The main will have a list of all the accounts that I use.
Personal website:
Boo hoo, I need a TPM, recent SIMD instructions, and DirectX12 support to be able to boot. Please help!
Boo hoo! 🎻
I dislike AI but I think you’re unfairly downvoted. I find it helpful for ensuring I’m taking care of necessary steps in a common, low-stakes procedure. It’s useful to generate sequences of terminal commands as well, though it’s important to check and understand what you’re doing.
I mostly agree with you. I find it really weird how I live in a world where all my Internet is being run through 5G cellular for political and social reasons and not for technical ones. Due to the monopoly on the cables, it’s actually much cheaper here to buy 5G home internet. It seems unnecessarily complicated and choosing to use a shared medium for no reason. It’s just the politics.
In case you’re not from the States, we have a monopoly pretty much everywhere for Internet services.
With my 5G I have unlimited data, and it’s 300 down 44 up on a good day. It’s perfectly serviceable if you can live with increased latency.
Pathetically weak flex cable and connector. Obvious problem and design weakness that’s persisted for years.
I think users who know what a NAS is probably know that information already. But true, yes!
It doesn’t just benefit you. You’re benefiting the current users of that spectrum that for one reason or another might not be able to switch.
I suspect most users though couldn’t tell you what frequency their network uses let alone the devices on it.
Ensuring that the system complies with industry standards and integrating security measures for cross-technology communication are also necessary steps, Gao adds.
This is absolutely a huge factor that could make or break the technology if they don’t do this perfectly. This could be the single most important part of the tech.
2.4 GHz is super saturated. The last thing we need is long range i.e. large footprint signals in already saturated spectrum. How this technology is deployed should either be not at all, or very carefully, to prevent widespread interference with existing WiFi devices. This spectrum is already on the verge of being complete trash. Please please do not be deploying more stuff on 2.4 spanning an entire “smart city.”
I’m doing DPI on my own network and I can still view TLS certificate fingerprints and some metadata that provides a good educated guess as to what a traffic flow contains. It certainly better that it’s encrypted, but there is a little information that leaks in metadata. I think that’s what was meant.
Following your edit, I’m sorry to hear that the patent system couldn’t protect him. This isn’t the first case I’ve heard of. Honestly, you have to be rich, which I think is completely intentional to ensure that only big business can benefit from a patent.
That’s really cool! My invention was a means of accelerated processing for images that makes it cheaper to produce what used to be dedicated color processing chips for digital cameras. While these are no longer used today, it did find some applications. At this point there’s a few libraries out there implementing some of it as open source with my explicit permission in the hopes they might find some use in the future and contribute to society that way.
As someone who was awarded several patents, these things were not made to be a source of infinite money forever!
Up there with our copyright law it’s a system that has been horribly abused to the benefit of super powerful corporations that run everything.
This requires people to play by the rules. I’ve yet to play a game that actually follows the written rules.
It looks like it’s the same flag to me. I mean, it’s entirely possible that administration could use a different path to applying the setting, but it has the same name.
I relate to your Windows comment. There was a point where I was that person with a bunch of different tools to modify my OS exactly how I like it, and then I realize I’m just doing more work. If I’m willing to do that work anyway, I might as well have an OS that is more malleable.
For those who may not want to click the link, this appears to show a workaround that enterprises might use to bypass the change.
Ah so now they’re a poor steward of my data as well as my money?
One should not be able to waive one’s rights.
It is highly unlikely that you have malware sophisticated enough to do something like compromise installation media (already exceedingly rare) yet not sophisticated enough to bypass secure boot.
The purpose of secure boot is to verify that the boot loader and kernel are approved by the manufacturer (or friends of such). There are certainly ways to inject software into a system that doesn’t reside in those locations. It just makes boot sector viruses and kernel mode rootkits slightly more technically challenging to write when you can’t simply modify those parts of the operating system directly. If malware gets root on your installation it’s game over whether or not you have secure boot enabled. Much of the software on a computer is none of those things protected by secure boot.
Plus, take another wager: most systems today ship with secure boot enabled. If you were a malware author, would you still be writing malware that needs secure boot turned off to run? Of course not! You would focus on the most common system you can to maximize impact. Thus, boot sector viruses are mostly lost to time. Malware authors moved on.
Overall, it’s a pretty inconsequential feature born of good intentions but practically speaking malware still exists in spite of it. It’s unlikely to matter to any malware you would find in the wild today. Secure boot keys get leaked. You can still get malware in your applications. Some malware even brings its own vulnerable drivers to punch into the kernel anyway and laugh in the face of your secure boot mitigation. The only thing secure boot can actually do when it works is to ensure that on the disk the boot loader and kernel look legit. I guess it kind of helps in theory.
This is good advice in general. Think of it like penetration testing. You really should verify what you can actually access remotely on a device and not assume you have any level of protection until you’ve tried it.
Log files can also contain signs of attack like password guessing. You should review these on a regular basis.
I know for a fact you can get a metal set for a few dollars plus shipping.