If they change the key in memory, then it doesn’t matter that you have the other side of the prior asymmetric key.
If they change the key in memory, then it doesn’t matter that you have the other side of the prior asymmetric key.
Encrypt your logs: exactly what you feared, and someone can just disable the encryption call or edit the key in memory too. Lots of ways to attack it.
That’s on me for typing vnc when I meant rdp, but nevertheless it’s true for both.
I think that screen lock is really only the case in Windows. Most linux vnc and rdp servers either run their own completely separate X session or share the console session.
That’s pretty impressive! I hope they can keep up the momentum at Asahi.
Sometimes those positions are meant for promoting internal candidates, who obviously sat in, conducting the same interviews in the past. So the difficulty is dialed up to “I am Death incarnate!” levels and they then have scoring data to support their selection of the internal candidate. At a friend’s workplace, they’d opened up a 2-3yr exp position to convert a great intern, and had some great 10+yr exp people apply. My friend said that was a little awkward. Even if Mark Russinovich or Linus Torvalds applied for that job, they still had no chance at getting it. I joked that I might put a resume in his manager’s pile for the creator of the tech stack they were interviewing for, just to hear how that reaction was.
That’s probably not representing even… 5% of these gauntlets, but it might make you feel better. Sometimes, it’s the hiring manager fulfilling the letter but not the spirit of some process, but it means they are frustratingly hard on candidates in the process.
And perhaps, ultimately, you have dodged some bullets.
trickled can help, but it can hit some issues when you get processes that fork other processes. Definitely test your use cases thoroughly - if you find it’s not catching a forked process then just post here with more details. There may just be a configuration change needed in trickled.conf to catch your scenario.
And new processors stopped supporting x86-32 a decade ago?
“32bit systems are a lot younger than 20 years”
I don’t follow. The i386 is almost 40 years old now. Can you elaborate?
I usually don’t keep boxes past the retail return window.
However, I am keeping the box for my ultrawide monitor until such time that I no longer have said ultrawide.
netseer-ipaddr-assoc.xy.fbcdn.net looks to be tracking.