• 0 Posts
  • 33 Comments
Joined 1 year ago
cake
Cake day: June 19th, 2023

help-circle



  • Any brands protected by American law must be independently-owned, with full transfer of all branding, patents, trade secrets, intellectual assets and physical assets.

    So, for example, for even a single bottle of Perrier to be sold in America, it needs to have been made by a company registered with the brand name of Perrier, with exclusive use of that name within the country, independently owned and under zero control by Nestle, being manufactured using the exact same process with the exact same ingredients, and having control of the exact same patents and American-side infrastructure.

    America is such a large marketplace that it would be impossible to split a company like this. Patents alone would prevent this, forcing Nestle to divest themselves of each individual subsidiary.






  • His router is tri-band though meaning it has 2 5ghz transceivers.

    Unfortunately, for many models - like the Linksys WRT 3200ACM - that second antenna (technically the third one if you include the 2.4Ghz one) doesn’t function at all without the manufacturer’s firmware. It’s a dead stick with any third-party firmware, and is 100% software-enabled.

    I have found this fact to be reliable whether it is DD-WRT or OpenWRT, and across several different manufacturers including Asus and D-Link.


  • What makes the built-in database easier to attack than a separate one?

    For performance reasons, early versions weren’t even encrypted, and later versions were encrypted with easily-cracked encryption. Most malware broke the encryption on the password DB using the user’s own hardware resources before it was even uploaded to the mothership. And not everyone has skookum GPUs, so that bit was particularly damning.

    Plus, the built-in password managers operated within the context of the browser to do things like auto-fill, which meant only the browser needed to be compromised in order to expose the password DB.

    Modern password managers like BitWarden can be configured with truly crazy levels of encryption, such that it would be very difficult for even nation-states to break into a backed-up or offline vault.





  • Our civilization demands that I be profitable to a parasite who leeches a majority of my labour’s value in order to accumulate obscene levels of wealth.

    Without exorbitant amounts of time spent maintaining that profitability, I will end up poor, homeless, and eventually dead from exposure. This leaves vanishingly little time to spend on open source work, regardless of how intellectually and ethically attractive it may be.


  • rekabis@lemmy.catoTechnology@lemmy.worldDesk read error occurred.
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    3 months ago

    running it in an ssd is it can speed it up

    Let me be absolutely clear: due to the finite write capabilities of solid-state technology, using SpinRite on an SSD is materially harmful to that SSD, and WILL shorten it’s operational lifespan by a non-trivial amount.

    This is why SSDs have wear-levelling technology: to limit the number of writes that any one data cell will receive. By using a program that conducts intensive read/write operations on sectors, you are wearing your SSD out at a much higher rate than normal, dramatically speeding up any failures in the future.



  • rekabis@lemmy.catoTechnology@lemmy.worldDesk read error occurred.
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    edit-2
    3 months ago

    SpinRite is only meant for traditional “spinning-rust” mechanical drives.

    SpinRite IS NOT meant for SSDs. The existence of TRIM makes SpinRite useless on any sort of solid state storage.

    And since almost all laptops sold within the last half a decade use SSDs almost exclusively, it is highly unlikely your advice will be useful.



  • If you are looking for Bar, it is highly likely that you are already looking specifically for a particular functionality - say, the action - for Bar. As such, it is irrelevant which method you use, both will get you to the function you need.

    Conversely, while it is likely you will want to look up all items that implement a particular functionality, it is much less likely you are going to ever need a complete listing of all functionality that an item employs; you will be targeting only one functionality for that item and will have that one functionality as the primary and concrete focus. Ergo, functionality comes first, followed by what item has that functionality.