That was kind of my point: an adult who can't manage her basic day-to-day responsibilities isn't particularly "mentally or emotionally stable."
And we should believe Apple why? Who thinks that if Apple gets a national security letter that they're not going to comply? And what about access to the increasing proportion of data that is stored on Apple's servers instead of the local iPhone? Is Apple going to say no to the NSA/FBI/CIA on that, too?
We've heard these promises before.
Is that why nobody even remembers Windows XP nowadays, let alone uses it?
This doesn't apply to WinXP of course, but for many kinds of applications lack of (security) updates isn't a big deal.
Not to mention their warrant canary is dead.
I already have a program to read all logs, more or less.
Ha! I see what you did there.
You remind me of a guy I was arguing on IRC with about 15 years ago.
He said I was wrong for returning when there was an error with fopen(). He insisted that I should just keep looping and looping around fopen() until it stopped having an error.
This is what was taught in colleges at the time, to loop around fopen().
However, if you have ever used such a program, you would know that if you made a typo, the file was NEVER going to open (to save) and the only way out was to kill the program. Well, if it was a text editor, you just lost all of your work...
SystemD may seem like a good idea. It may implement what was taught in class. I can guarantee you that it will bring more than one person to tears when they get screwed over by it... and let there be no mistake, people WILL get screwed over by it.
Please tell me how you will fix your system when SystemD aborts because one aspect of everything it touches is not what it expects? You will not and you can not fix it. Reinstalling is the only option at that point because you can not even get to a recovery console. Sure, you could boot off of a "repair" disk but how will you view the logfiles? Oh, right, you will need a specialized executable to view anything at all. Ah, but the file did not close properly... what fucking good is a torn up binary log file?! At least with a torn up text file, you can get something out of it.
Mark my words, someone somewhere will be laughing their asses off at the fact that they got people like you to push SystemD... and there will be someone somewhere else cursing people like you who pushed SystemD (out of ignorance or malice?).
It is not just because people love the old way. No, it is cursed at. But cursed at less violently than "the new hotness" is cursed at.
Bernadette is maybe the most well adjust and "normal" character on that show, with exception of maybe Penny.
A grown woman who can't be bothered to learn how to manage her household budget or maintain her car comes across as the most "well adjusted and normal." That's even sadder than the parade-o-parodies that makes up the rest of the cast...
And don't give me any of that "plight of the economically disadvantaged" stuff as a crap excuse . She can afford the bog-standard closet full of double-hex-digit pairs of shoes and "girls' shopping trips" and MMOGs (because they realized that there was a stereotype they hadn't played for cheap laughs yet).
B) You have clearly missed that this was supposed to be a joke.
C) Had this story actually been about tides and not wind (see A above,) then I would be right: retarding the tidal bulges even more than they already are (via harnessing) would slingshot the moon even faster than the tides currently do.
the best way to do this is to make a basic user account for normal mode, and an administrator account for accessing everything. all the settings for WM can be made so that admin can see everything wile basic user sees only a custom menubar and desktop and can't actually do anything. if their desktop icons are made immutable they won't be able to remove them, and if you find cheap hardware to run it all on they won't be a target anymore except to spammers/con artists.
is a $100 device you could work with and just tell them it's their new pc. since it has a serial port many hardware modems will work, and need no drivers, usb modems may or may not work i don't know...
Agreed on the ChromeBook.
I'm not sure about making a ChromeBook use dial-up, so the solution is to somehow get a WiFi router on dialup.
I think there used to be WiFi routers that could manage a modem directly, but there isn't much call for them these days so I doubt you can find one.
You could set up a computer with Linux just to manage the dialup, and plug that into the router's WAN port. But maybe you can just customize a router to do what you need:
Buy a router that is well supported by open firmware and has USB ports. Install the open firmware, login as root, then customize the router to do the dialup with a USB modem.
In the past, I have used TomatoUSB with an Asus RT-N16 router (costs about $80 new). It was a pleasure to work with. The router gives you about 24 MB of usable storage using onboard flash memory, but you can trivially plug in a USB flash drive and have gigabytes of storage if you need it. But you can probably set up the needed scripts to manage the modem in the 24 MB space.
There are newer routers with bigger onboard flash if you prefer. I only mention the Asus RT-N16 because I have actually worked with one, and it's very inexpensive. And it has plenty of CPU speed and RAM for this application.
The above solution is cheaper than using a computer to manage the dialup, and should be bulletproof. Also your relatives are unlikely to mess with it.
P.S. Hmm, I did a quick Google search and there are still routers with dialup support. Here's one for about $150... I've never used one so I don't know how well it works.
i don't know where to go with Linux recommendations but pppd on freebsd will allow dialup on demand, but if you don't want that a manual link can be put on the desktop. chflags run as root (chattr if you don't like bsd and insist on linux) can make files immutable then not even root can delete, or move without running the chflags program first. if you want parts of the os to be protected feel free to make immutable files anywhere you feel like it to 'harden' the system the freebsd handbook has a walkthrough on compiling the kernel which is highly recommended for removing features and making the system harder to hack. disable or remove everything you or they don't need to further harden the system, and use a customizable WM and edit it so that only the functions you or they need are present i don't know what the people use these days, though.
freebsd is easily configured to run on slow computers. keep in mind software modems may be a real pain to configure and there are usb modems that might work good, further research is required. i don't know what hardware you're running for them, but if you've got them on an arm board there are way more people working on linux based ARM support while FreeBSD warns they aren't end user ready... however a basic browser and email virtually anything x86 is usable for a modern browser which may not work right on dialup requires at least 256MB of ram with 1GB or better recommended by me.
That may be intentional. In fact they confirm it is. What better way for an attacker to cover his tracks after a successful break-in then being able to credibly corrupt the logs.
Have none of these people spent even a week on the administration side, FFS? Change "an attacker" to "a malfunctioning process" and, all of a sudden, you want it to be recoverable so you can figure out WTF went wrong so you can fix it.
Jesus's father did know, but didn't care. If god(s) exist, they aren't very nice people.
Well, it depends on how pedantic one wants to be (and this is slashdot, after all.:))
BSD is Unix, but not UNIX(TM). That is, it has the provenance, but not the corporate blessing. Feeling that the latter would confer any value is probably a litmus test of some sort...
Your other two examples are duly solemnized carriers of the brand name, however.
It's probably a hell of a lot cheaper than batteries. Pumped storage has been an up-and-coming technology for 20 years now. I worked on one project in which they hollowed out an entire stone mountain, creating huge chambers to store water for a pumped-storage system.