...but buggars can't be choosers I guess...
Fixed that for ya...
...but buggars can't be choosers I guess...
Fixed that for ya...
I'd be surprised if the drive even spins though. Most of the time when I go to try ancient hardware, the drives don't spin, or spin enough, even though the owner remembers that it was working when they shut it off.
I've heard the fix for that is to spin the entire drive while applying power; kind of nudge it along the platter's axis to get the bearings unstuck. It involves "open-case surgery," where you have the drive out of the case and free to move while you first apply power. Once it starts spinning, you'll want to power down and reinstall into the case so you don't knock it around while it's operating and damage it further.
OK, this is clearly a bad thing, but I don't think it means that your private LAN is immediately accessible to people all over the world does it? Multiple routers using the same keys means you could be tricked into logging in to someone else's router without knowing, but that would still require some way of directing your traffic to the impostor's device to begin with, such as DNS hijacking.
Finally, a breath of sanity... Thank you, nuckfuts! A shame this is the bottom thread in the post.. at least when I got here.
There is a huge difference between a host key and a user key. These consumer devices all share the same host key, which is only used by the client to verify that the host you're connecting to is the host you think you're connecting to. This is the key in
The host key is only ever used for authentication, never for authorization, which is to say it identifies the server you're connecting to, but in no way grants any privilege to access it. The only risk here that I can think of is a MITM attack. Since the host key is well known, someone could fiddle with your DNS or local ARP tables and make a victim connect to their evil server without the scary "MAY HAVE BEEN COMPROMISED!!!" warning you get when the destination host key doesn't match what's in the known_hosts file.
If someone can paint a more frightening scenario (based on known host keys, not user keys), I'd like to hear it. If you don't understand the difference, don't bother trying.
As your employer, I'm still going to need to see that full ID. Remember, you are an At Will Employee.
As your federal government, I'm investigating claims that you are asking for your employee's voting IDs. Remember, you are subject to the laws of the federal government, and the fine for this particular infraction will surely put you out of business.
A good AC can easily move 3-5 watts of heat for each watt of energy it requires to operate. No such luck with heating systems, they at best get you 1 watt of heat for each watt they take.
You really need to qualify that statement. You get 1 watt of heat for each watt you use... for resistive heating. Many places that need both cooling and heating don't run an A/C and an electric heater, they run a heat pump, which pumps heat either into or out of the house. Because of the heat differential, one direction may be more efficient than the other, but it is still much better than a resistive heating element
In one minute of research, comparing a 2.5 ton 13 SEER A/C to an equivalent heat pump, the ability to both heat and cool adds a little less than %20 to the price at Home Depot. Installation costs are likely identical, as they both consist of the same components. With that cost differential, an A/C + resistive heat solution is only smart for a place that only needs heat a few nights per year.
... when configured to boot straight into Steam Big Picture mode, the influence of the underlying OS is visible only in the larger game library.
... and the considerable additional maintenance requirements that go along with a full fledged operating system. Considering that Windows has required more frequent patches for security issues than Linux for the past few years, that's not a trivial distinction.
With Windows on it, this little machine can fulfill most of my needs for the living room / home and offers me a platform that i am already familiar with to play my games, (Steam supported or not), get some work done (Office etc) and watch movies.
While this is a valid point, it is a realization of this change in paradigm. With Windows 8.1, it is a regular desktop computer, not a gaming console. While that gives you the ability to do office work and more, it takes it out of the single-purpose, dedicated function, "appliance" category that consoles usually fall in.
With Linux running as essentially an embedded OS, it's likely that updates would be less frequent, smaller, and less crucial to it's overall suitability if skipped. As an example, how long has it been since you've updated your smart TV or DVR as opposed to your desktop or laptop?
Ok, seems like you're trying to do things the windows way, i.e. blocking outbound connections based which application is running. Things are not done that way on Linux. Outbound connections are open and most of us are fine with it.
The Window Firewall, the original BlackIce for Windows, and AVG as well, I believe, all fall in the category of Application Firewalls, as they base their actions with knowledge of the application holding the IP connection endpoint. IPtables is a Stateful Firewall, so named because it relies solely on the connection's state, without regard to the application at the sending or receiving end of the connection.
The Application Firewall link above actually does have some suggestions about how such things can be handled on Linux using utilities others have described. Mandatory Access Control tools such as SELinux and grsecurity can allow or deny access to resources (such as the network interface) to applications, but I don't believe they have fine-grained controls for conditional access based on IPs or ports.
None of these are as easy to use as AVG for Windows is.. (This could be the new definition of "understatement!") In fact, I would like to think I know Linux quite well, have used it as a desktop and server platform for years, have written patches for kernel modules, and can configure a solid IPtables firewall ruleset from scratch, but AppArmor and SELinux still scare me...
There's a link here describing how to mark packets based on an application's uid (user). This might be a basis for controlling permissions per app, but you're talking about a very complex IPtables ruleset. Definitely not for someone only two days into their Linux journey.
Feedback: VLC is my first install regardless of OS. Damn thing just runs anything I throw at it. Used it for years now.
I hope you're not running on Dell hardware...
Why not perhaps a more majestic creature?
Similar facial hair...
If they can make penicillin out of moldy bread, they can sure make something out of you. -- Muhammad Ali