IT news, malware, virii, trojans (both kinds), generalized IT sarcasm, 2nd ugliest blog on the net, vaguely related to ThermionicEmissions
Monday, February 10, 2020
Intel Beats Ubuntu?
Emotet now hacks nearby insecure wi-fi networks
Google Chrome will block a number of file downloads over non-secure connections. I so love helpful software.
Win 7 won't shut down
I don't even have to make this stuff up
Win 10 users PISSED over search failure
MS issues lame, incorrect excuse
Why you can't bank on backups to fight ransomware anymore
Because the thieves are stealing info and ransoming it.
RobbinHood ransomware successful because deprecated driver signing
Why is the healthcare industry still so bad at cybersecurity?
Estee LKauder exposes 440M records, with email addresses, network info.
Linux
Linux OS from Intel beating Win 10 and Ubuntu, on AMD hardware
Intel Clear Linux [using Phoronix test]
How fast are your disks? Find out using fio
How to install Seafile to syn and share files on Ubuntu
How to add and delete static route using IP command
8 ways to check memory usage
What's the difference between grep, egrep, fgrep
the spelling
How to run single command on multiple remote systems at once
Ubuntu 20.04 will ship with linux 5.4
Linux access control lists
for people who like self-torture, undo and redo in vim/vi
Limit the impact of a security intrusion with systemd security directives.
Python if.else statement
Disable swap
The (#*@ing spellchecker spontaneously disappeared. This is not a good thing.
Subscribe to:
Post Comments (Atom)
Corona Malware
This blog has been suspended for a bit because it's practicing social distancing. Or no one reads it. Or I'm too lazy. Or the str...
-
Crafty Web Skimming Domain Spoofs “https” What WHO calling the coronavirus outbreak a pandemic means it means more headlines to bea...
-
Microsoft delivers emergency patch to fix wormable Windows 10 flaw Modern RAM used for computers, smartphones still vulnerable to...
-
The Internet of Things is a security nightmare reveals latest real-world analysis: unencrypted traffic, network crossover, vulnerable OS...
No comments:
Post a Comment