Onno (VK6FLAB)
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork
- 70 Posts
- 378 Comments
Onno (VK6FLAB)@lemmy.radioto
Programming@programming.dev•Ideally speaking, if I build up my own system right from the scratch, then l ought to be in control of the root, isn't that correct ??🤓🤓🤓
6·2 days agoNo.
Secure boot is about trusting which (signed) software is running.
Onno (VK6FLAB)@lemmy.radioto
Technology@beehaw.org•'It's going to be really bad': Fears over AI bubble bursting grow in Silicon Valley
267·22 days agoIt’s likely going to take down whole companies if not countries.
Wait until you see our dropbears. .
Onno (VK6FLAB)@lemmy.radioto
Android@lemdro.id•The unsung heroes of Android: Remembering 8 legendary apps we’ve lostEnglish
6·26 days agoAnd we’re still stuck with its aftermath in that search engines require quotes rather than a + for requiring words, which they now ignore whenever the mood strikes.
Why?
Because some fuckwit at Google decided that the + was reserved for Google+ search results.
From a security perspective I’d be surprised if number of mentions as a metric has any bearing whatsoever on the impact or urgency of a CVE.
If you’re using mentions as a proxy for affected user base, I’d hazard an opinion that there are better ways of determining the impact footprint of a CVE.
Finally, a vulnerability rating or priority is determined and published with each CVE, so I’d expect that this would take into account some of those considerations.
That said, a vendor ranking seems like something that I’ve not seen before, mind you, the notion that Microsoft didn’t make it into the list is gobsmacking considering that patch Tuesday addressed 81 flaws and 2 zero-days in September.
In my opinion, he idea seems useful, but the execution needs some work.
… and this is why we use YYYY-MM-DD as the date format.
Onno (VK6FLAB)@lemmy.radioOPto
Privacy@lemmy.ml•Australian Under 16 media ban is censorship by stealth and data harvesting by law
3·1 month agoThey’ll use machine learning to determine based on your behaviour if you’re under 16, then they’ll ask for proof of age.
Thank you for making my point.
Onno (VK6FLAB)@lemmy.radioOPto
Privacy@lemmy.ml•Australian Under 16 media ban is censorship by stealth and data harvesting by law
4·1 month agoIn ICT circles, sure, on the nightly news it’s crickets.
Onno (VK6FLAB)@lemmy.radioOPto
Privacy@lemmy.ml•Australian Under 16 media ban is censorship by stealth and data harvesting by law
11·1 month agoWe know very little beyond:
- It will go live on 10 December 2025
- There will be heavy fines.
- Government ID is not allowed to be the only method.
- A self declaration (tick box) is insufficient as a check.
There are to my knowledge no third party providers approved for this legislation. The process to assess actual implementation details started in July 2025, and the results thus far are underwhelming to put it mildly, you might call it a shitshow.
Below is the official sum total of what we know, most of it motherhood statements and “coming soon”.
https://www.esafety.gov.au/about-us/industry-regulation/social-media-age-restrictions
Media commentary wants to “protect the children”, but have no idea how you might do so, let alone consider the implications or implementation details.
Source: I’m an ICT professional with 40+ years experience.
What are you attempting to achieve by opening this list of urls?
What is the difference between running this script and setting this list as either a bookmark, or the homepage in your browser?
What does your network have to do with the reachability of these sites?
If you’re managing the privacy of your own network, why are you not monitoring those services?
The open-source alternative to Mailchimp, Brevo, Mailjet, Listmonk, Mailerlite, and Klaviyo, Loop.so, etc.
That’s the first paragraph of the project page.
Onno (VK6FLAB)@lemmy.radioto
Selfhosted@lemmy.world•Notifuse is now open sourceEnglish
241·1 month agoNot to rain on the parade, but in my experience, having had to email customers in bulk … sending tickets and logistics requirements for large events … I can tell you that self hosting this is a complete and utter waste of time.
You’ll get blocked before the first batch of emails leave your mailer.
Not even paid MailChimp or Campaign Monitor could guarantee delivery.
The problem is not the platform for sending email, it’s the centralised nature of email hosting, much of it is behind Google and Microsoft hosted services.
Onno (VK6FLAB)@lemmy.radioto
Privacy@lemmy.ml•Is my adblock list pretty overkill/redundant?
6·1 month agoI used to have a pihole running on my network, but now I just use the
dns.adguard-dns.comon my network and phone.
Onno (VK6FLAB)@lemmy.radioto
Linux@programming.dev•Linux github repo is now a dating board
13·1 month agoBut imagine the commit log.
Here’s how we fix a society that’s already drowning in advertising … more advertising.
Russell Howcroft would think that this was the Duck’s Nuts!
Onno (VK6FLAB)@lemmy.radioto
Selfhosted@lemmy.world•[SOLVED] is there a way to run openwrt and debian at the same time without virtualization?English
9·2 months agoDocker is not virtualisation, although it’s a common misconception.
A better way to think of it is a security wrapper around untrusted processes.
You can prove this for yourself by looking at all the processes running in a Docker host while one or more containers are running, you’ll see all the processes listed.
In other words, you don’t need a CPU capable of virtualisation to run Docker.












In the vast majority of operating systems the person who installs the system is by default the highest privileged user, in the case of some of those systems, that user is called root.
However, the word root is also used to describe the basis of several file systems.