• 0 Posts
  • 32 Comments
Joined 1 year ago
cake
Cake day: April 13th, 2024

help-circle




  • I’d start with the following, and refine if necessary:

    “Gaining unauthorized access to a protected computer resource by technical means.”

    • Port scanning --> Not hacking because there isn’t any access to resources gained*
    • Using default passwords that weren’t changed --> Not hacking because the resource wasn’t protected*
    • Sending spam --> Not hacking because there isn’t any access to resources gained
    • Beating the admin with a wrench until he tells you the key --> Not hacking because it’s not by technical means.
    • Accessing teacher SSN’s published on the state website in the HTML --> Not hacking because the resource wasn’t protected, and on the contrary was actively published**
    • Distributed denial of service attack --> Not hacking because there isn’t any access to resources gained

    * Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
    ** The governor and his idiot troupe eventually stopped their grandstanding and didn’t file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily






  • Pre-UEFI they were fighting over the boot sector, sure, but now that everything is more well defined, and every OS can read the FAT32 ESP? Never seen it…

    At worst the UEFI boot entry is replaced. There are some really shitty UEFI implementations out there which only want to load \efi\microsoft\boot\bootx64.efi or \efi\boot\bootx64.efi, or keep resetting you back to those.

    Assuming you were dumped into Windows suddenly, you can check if you have the necessary boot entries still with bcdedit and its firmware option

    bcdedit /enum firmware
    

    If you just have a broken order you can fix it with

    bcdedit /set {fwbootmgr} displayorder {<GUID>} /addfirst
    

    If you actually need a new entry for Linux it’s a bit more annyoing, you need to copy one of the windows entries, and then modify it.

    bcdedit /copy {<GUID1>} /d "Fedora"
    bcdedit /set {<GUID2>} path \EFI\FEDORA\SHIM.EFI
    bcdedit /set {fwbootmgr} displayorder {<GUID2>} /addfirst
    

    Where GUID1 is a suitable entry from windows, and GUID2 is the one you get back from the copy command as the identifier of the new entry. Of course you will have to adjust the description and the path according to your distro and where it puts its shim, or the grub efi, depending on which you’d like to start.

    Edit: Using DiskGenius might be a little more comfortable.






  • Not really, she really is just an old elf lady who looks like a young adult human. There’s nothing sexualised about her, and she’s not childlike. For example here she is next to a human child who becomes her apprentice:

    And here she is talking to a human priest she was adventuring with 50 years ago, he’s grown old, she hasn’t changed:

    And here she is head patting him, to give him reassurance that he did well after he confides that he never felt like he figured out how to be “a grown up” and just kept faking it while growing old:

    The human child is Fern, and the old Priest Heiter picked her up after she was orphaned by a demon attack. Heiter asks Frieren to keep taking care of Fern after his death, and mentor her in magic.

    It’s a really nice relationship driven story with an interesting storyline and magic system.



  • In my experience that’s usually the case for XG-PON and XGS-PON networks. Because you’re sharing one port on the OLT with up to 63 neighbours. Though I think most build outs aim for 16 or 32 splits.

    Anyway they don’t want to risk you sending when it’s not your turn or disturbing your neighbours connection in any other way, they make you use their ONU. Basically the same old story like with the coax cable modems. Just because some idiot (or rather industry group of idiots) had to go and turn fiber back into a shared medium to save on cable and ports a bit.




  • Yep. Relevant sentence bolded by me below

    6d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements.