Now you've got to learn Mandarin or Cantonese or shunt her out of your "loved-ones-group".
The bigger question, though, is WHY THE FUCK can't we either disable whole-drive encryption, or at least set it to a key WE control, with some means to read the bits from even a drive that's totally nonfunctional SATA-wise (JTAG, SPI, whatever) and reconstruct it offline?
Can we do that with mechanical drives ? As someone who has to do quite a lot of data recovery recently (thank you WD 3TB Green)
I'm very interested in knowing how, also the WD Mybooks come with a hardware encryption PCB.
Has anyone had success of bypassing/cracking those, since they fail fairly often and the data on the disk is "scrambled" without them.
How do you really know what you need? Which specs are really relevant?
The easies method: You open a taskmanager and have the user recreate its troubled session.
Then you look at what is starved (memory, cpu, IO) and by whom and you upgrade hardware
and tweak/replace the software if possible.
Sometimes you need to do this over a longer period then it's time to write some scripts to poll
I see it all the time that people confuse the distro with the desktop. Even when professional reviews are done, what they test is not the distro, but the current version of the desktop.
They are testing the distribution's default configs for those desktops !
"I just want to be a good engineer." -- Steve Wozniak, co-founder of Apple Computer, concluding his keynote speech at the 1988 AppleFest