Skip Navigation

Posts
0
Comments
225
Joined
2 yr. ago

  • Yellow signs are suggestions or warnings. Always have been. Construction (temporary) are orange. As seen in the OP.

    When it comes to what order on how you should follow them:

    • Orange
    • White
    • Yellow
  • If it found a way, then your server configuration is inadequate. Are you using old ciphers or protocols? Missing headers? Wrong headers? Something doesn't add up here.

  • You always will. Welcome to the Internet. The difference is whether or not you've taken steps to secure your stuff. You need to understand what this malware is looking for. It's explicitly looking for unsecured services. Such as WordPress, SQL, etc. There are inexperienced users out there that inadvertently expose themselves. I see this type of probing at work and at home. Don't overly stress it. My home server has been running for a decade without issues. Just keep it updated and read before you make any changes if you don't fully understand the implications.

    My home based server is behind a pfsense firewall. Runs Arch. Everything is in a non-root docker container. SELinux is enforced. All domains are routed through Cloudflare. Some use Cloudflare Zero Trust.

  • Oh my. You're doing it wrong. Exposing the unencrypted connection without the proper security measures is putting yourself at risk. Regardless of how strong you set the password, the connection can still be abused in all manner of ways. If you read the jellyfin documentation, you'd see the developers clearly state you should never do this. You need to put Jellyfin behind server software. Specifically a reverse proxy. I use NGINX. You can setup your connection to be secure this way. You can now also use Cloudflare if you have cache turned off. And if you really wanna go the extra mile, route it behind a VPN. Though this makes it harder for those you share it with or some devices that don't support VPN.

    Please revise your connection. If you need help, feel free to reach out.

  • Office doesn't have native Linux binaries. You either have to use a VM or Wine. You'll find most people recommend a VM. There are Office web apps, but they're not as robust as the Windows native offerings. Microsoft doesn't really want to offer Office on Linux. Stick with Windows for the remainder of your education. Once you've finished, you can sink time into learning Linux.

  • Exactly.

    If my device is compatible, does it automatically have access to Google Play and branding?

    No. Access isn't automatic. Google Play is a service operated by Google. Achieving compatibility is a prerequisite for obtaining access to the Google Play software and branding. After a device is qualified as an Android-compatible device, the device manufacturer should complete the contact form included in licensing Google Mobile Services to seek access to Google Play. We'll be in contact if we can help you.

    https://source.android.com/docs/setup/about/faqs

    Google services are entirely missing from Android open source. The Google Play package is what contains the entirety of Google's services.

    Not sure if anyone remembers but back when cyanogenMod was the go-to, early versions had Google services included. Google sent a cease and desist notice and said it was a license violation. You cannot distribute it as part of the OS by default. The next release of cyanogenMod had it removed. Users had to flash the package if they wanted it.

  • See 2.5.6 here: https://developer.apple.com/app-store/review/guidelines/

    It is possible to build perfectly decent web apps but many times they choose not to or it’s too much trouble

    On iOS, they quite literally can't in some aspects. They're restricted to using the supplied WebKit Apple enforces. On Android you can use the Blink Web View (Chromium) or Gecko Web View (Firefox). Both of which can be bundled in the app, or you can use the system version.

    They have different browsers with limitations but I don’t know about not proper.

    Every single iOS "browser" is WebKit. AKA Safari. Due to Apple's plug-in system being proprietary, it's difficult to extend. Third party browsers typically use JavaScript injections which slow down the browsing experience. The supplied WebKit is also watered down and updated on a slower cycle. Apple intentionally makes their browser better.

    You're not actually using Microsoft Edge. You're using Safari and it's being identified as such by the UA string. Due to Safari being in last place for web standards feature support, it's not surprising you're coming across the issue.

  • Doubtful. Load it up in a VM. Windows guest, Linux host. Use a network monitor to see what it does with and without a firewall on.

  • IMO, one of the best Chromium based browsers is Vivaldi.

    • Microsoft threw in the towel on Edge HTML.
    • Opera gave up on Presto (the source code for this leaked at one point in time).
    • Brave was a decent choice for a while. It's controversial now.
    • Avast and Comodo AV companies have their own Chromium.
    • Amazon Silk is mobile Chromium for Amazon's devices.
    • Samsung Internet is mobile Chromium for Samsung devices.
    • Yandex search has a Chromium browser.

    There's more than this but these are the big names.

  • Jellyfin gives you 100% control. You're responsible for setting up remote access. Which actually isn't that hard. Several IT and network admins of the community (myself included) hand out documentation on how to do this. Without completely ruining your security.

    With Plex, some of the application communication is routed through their network. It requires an active internet connection and you must create an account with them. They have third party analytics embedded, use tracking pixels, beacons and device fingerprinting. Whatever personal data you have supplied is used to serve ads. This being their promoted content that isn't part of your library.

  • Permanently Deleted

    Jump
  • From their own privacy policy they outline what they do:

    For research and development purposes, we may use datasets such as those that contain images, voices or other data that could be associated with an identifiable person.

    To provide location-based services on Apple products, Apple and our partners and licensees, such as maps data providers, may collect, use, and share precise location data, including the real-time geographic location of your Apple computer or device.

    Apple’s websites, online services, interactive applications, email messages, and advertisements may use "cookies" and other technologies such as pixel tags and web beacons.

    We also use personal information to help us create, develop, operate, deliver, and improve our products, services, content and advertising

    At times Apple may provide third parties with certain personal information to provide or improve our products and services, including to deliver products at your request, or to help Apple market to consumers.

    Apple may collect location, IP Address, network information, Bluetooth information, connected devices, accessories, personal demographics, browsing history, browser fingerprint, device fingerprint, search history, app data, usage data, performance, diagnostics, product interaction, transaction information, payment information, purchasing records, contacts, social graph, watch history, listening interests, reading list, call metadata, device information, messaging metadata, email addresses, salary, income, assets, health data, ad interaction, in-app purchases, in-app subscriptions, app downloads, music downloads, movie downloads, TV show downloads, Apple ID, IDFA, Random Unique ID, UUID, IMEI, Hardware serial number, SIM serial number, phone number, telemetry, cookies, Nearby WiFi MAC, Siri request history, Web sign-in, songs played, play and pause times, playlists, engagement and library.

    Literally all of this is what Google does. The only thing Apple does differently is hinder 3rd party apps to a greater degree. But to be fair, Google has been improving the Privacy features of Android with each version.

  • The Feedback Hub was introduced to fix this gap in user reports for Windows. Microsoft does actively monitor this. They respond when necessary, merge topics, deny or approve bugs/suggestions, etc. For their software, such as Terminal or VS Code, you can use GitHub issues.

    Keep in mind, like most companies, Microsoft has guidelines on what employees can say when responding to any user feedback. This is why we typically see a lot of copy and paste. When it is more than that, wording is selective and you may not get more than one or two responses in total.

    I know of at least one employee on Reddit who participates every so often. https://www.reddit.com/user/jenmsft/

  • Third party AV just becomes malware itself by hooking into nearly every function at the kernel level. Of course this adds overhead and why historically Windows updates and third party AV have clashed leading to disaster. Blue screens, failed updates or failure to boot.

  • Our taxes at work. I'd much rather defund Israel and just continue supporting Ukraine. Take all that money we send to Israel and use it to fix our own problems.

  • Your statements made me believe the opposite. Though I wasn't condescending. I said it was OK to not know.

    Microsoft doesn't say that. They state it adds to the security of your computer before Windows even starts. https://learn.microsoft.com/en-us/windows/security/operating-system-security/system-security/secure-the-windows-10-boot-process

    Any device security is multi layered.

    Having a mechanism that only accepts trusted boot binaries is pretty critical to fighting malware. Rootkits effectively have total control of whatever you decide to boot because of their persistence. When your hardware has its own security features (Secure Boot, TPM) why not take advantage of them to make the software you run more secure?

    If you didn't know, Android, macOS and iOS have their own TPM and Secure Boot implementations that have been enforced and present for over a decade.

  • Your entire statement here stems from not knowing what you're talking about. That's OK. I'll provide some insight.

    Secure Boot is a security feature of UEFI that only allows trusted, cryptographically signed operating systems to boot. The nature of this prevents rootkits. Software that runs before the OS and injects itself. BIOS has many hard limitations and disadvantages over the modern standard that is UEFI. Your comparison going from 32 to 64 bit architecture is quite fitting. It's not that different. There are many hard limitations and disadvantages to 32 bit. It's unfit for today's standards due to lack of features and security. All aspects of technology have to move forward.

  • Eh. Adobe puts more effort into making it harder or tedious.

    With the introduction of Creative Cloud, the notorious "amtlib.dll" that houses Adobe licensing, was bundled into the respective applications binary (exe). It didn't stop pirates. In 24 hours they found the licensing mechanism and patched it.

    You could create a CC account, install the desktop manager, install any app(s) you wanted, then crack them. When an update arrived, you could simply update the app(s) and apply the crack again.

    Occasionally the licensing mechanism would update and an updated crack would be needed. As usual, pirates had this worked out the day of or a day later.

    Adobe would later patch the desktop manager and break functionality to update software if it wasn't genuine. People could still get the latest versions by uninstalling and reinstalling through the desktop manager. Since it would retain user settings by default.

    Later, a mechanism was built into each application that would throw a warning message that the application isn't genuine. For example, Photoshop would soft lock and the genuine check would display with the only option to close. This too was eventually patched out by pirates.

    The latest attempt from Adobe now forces users to input and have a credit or debit card saved before activating a trial. This removed the ability for users to easily install software anonymously.

  • It's pretty wild how Google search has degraded. The push for SEO has really ruined useful results.

  • Everyone's perception is different. I can do 60 fps. I prefer 90 fps minimum and 120 fps target. I see no benefit at 144 or higher. Anything below 60 fps and I just get frustrated. That's my perception.

    30 fps though is something we should move away from. Given how far we've come in with all kinds of hardware and software features.