Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)UR
Posts
7
Comments
594
Joined
2 yr. ago

Permanently Deleted

Jump
  • It is still probably one of the better ways to manage your passwords short of using a password manager. I don't know any hackas but it feels like a lot of effort, finding patterns in a list of passwords. When you have found a pattern, you must also figure out what the pattern is.

    On the other hand, it could be a viable way given that there are some huge leaks with a lot of data. Perhaps someone is selling datasets of hacked patterns, it could be another way to find someones paypal password.

  • This link has more information that looks relevant: https://askubuntu.com/questions/89219/is-there-a-difference-between-swap-and-cache-memory

    Disk Cache memory: This are chunks of the physical memory, the RAM, used to store files. That way when a program needs to read the file, it's fetched from memory instead of the hard disk. This is done because memory is way faster.

    Swap: This is a place on the hard disk (usually a dedicated partition) that is used to store programs or data that can't fit in memory, like when a program grows more than the available memory. SWAP is way slower than RAM, so when you hit swap the computer gets slower, but at least the program can work. In linux swap is also used to hibernate, or to move low used program out of memory to allow more space to the disk cache.

  • I've read people's stories before were their number got listed somewhere and people just never stops calling even though it is the wrong number. It has never happened to me but it really sounds terrible. Sound of an block any unknown caller seems like the only option (but not so great if you are applaying for a job).

  • Permanently Deleted

    Jump
  • From what I understand, they (hackers) try known email/password combinations at different sites because a lot of people reuse their passwords. I also find it unlikely that anyone trying hack accounts will spend any amount of time looking at individual passwords if their list is 1000+ (and we know there are leaks in the milions).

    I agree that they are reasonably save unless they are targeted.

  • Permanently Deleted

    Jump
  • Why not? It's not going to be cost effective to discard a usable computer, of course. But hen your phone can be hooked up to a monitor, mouse and keyboard and the phone's internet can be used to stream the remote computer, why have a computer? Or if your phone could give you the same interface as your current computer?

    I will personally most likley always own a "ordinary" computer, but I wonder if a majority of the populace will.

  • Permanently Deleted

    Jump
  • I haven't seen The Expanse, but I get it from context. I still believe that is how a lot of people will operate in when 5G is wide spread enough in the US (because that is most likely where the money to develop this will come from and hence the first target market. Or perhapas somewhere in Asia.) + 5 years to develop and sell products.

    Unless I am completely wrong and some other trend comes along and the tech world takes a whole other course. 🤷