01189998819991197253

joined 2 years ago
MODERATOR OF
[–] 01189998819991197253 10 points 1 year ago* (last edited 1 year ago) (2 children)

If your Air hadn't reached it yet, eventually it'll reach EOS and you'll stop receiving software/OS updates from Apple. While this won't force you to upgrade hardware, it does add significant risk to your online time, since vulnerabilities will go unpatched. But, again, an important difference, which you shrewdly point out, you're not forced or coerced to upgrade.

Edit: autocorrect

[–] 01189998819991197253 3 points 1 year ago (1 children)

The ghost in the machine takes a new, quite disturbing face.

[–] 01189998819991197253 5 points 1 year ago

You're not alone on this boat, mate.

[–] 01189998819991197253 1 points 1 year ago

During the winamp days, it was joked that winamp was the emu. And winamp "really whips the llama's ass".

Then they sold out, and started whipping their own ass, but that's another story.

[–] 01189998819991197253 1 points 1 year ago (2 children)

But it really kicks the llama's ass...

[–] 01189998819991197253 1 points 1 year ago (2 children)

I prefer this variant from the Pennsylvania Dutch, originating in the early 1800s.

[–] 01189998819991197253 1 points 1 year ago

Couldn't decide which one, so here are both...

[–] 01189998819991197253 1 points 1 year ago

Super interesting approach. I like it.

[–] 01189998819991197253 2 points 1 year ago

I set up a kiosk on a Linux Mint machine today. From blank, unformatted drive to fully deployed kiosk, it took less time than just installing a base install of win11.

[–] 01189998819991197253 143 points 1 year ago (4 children)

Those aren't prompts. Those are ads. Call a spade a spade. "Microsoft tries to convince Windows 10 users to buy a new PC with full-screen ads"

[–] 01189998819991197253 3 points 1 year ago

Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus.

"Helldown deploys Windows ransomware derived from the LockBit 3.0 code," Sekoia said in a report shared with The Hacker News. "Given the recent development of ransomware targeting ESX, it appears that the group could be evolving its current operations to target virtualized infrastructures via VMware."

Basically, it was historically a windows malware, and it has expanded its attack surface to include Linux.

view more: ‹ prev next ›