Huh, my favourite part of using C and C++ was the ease of doing it all on Linux. Didn’t even need to install a compiler, just write code, run compile and laugh my way through endless segfaults because I am very bad at those languages
JoshCodes
- 5 Posts
- 109 Comments
Ask a new user, the unsurprising answer is “ez pleazee”.
JoshCodes@programming.devto
Technology@lemmy.world•Australian Government gets a taste of what everyday people have to deal with in terms of data breaches as Prime Minister Anthony Albanese's mobile phone number released onlineEnglish
5·30 days agoYeah so targeting individuals or specific organisations is pretty hard. It sounds dumb but how do you get someone’s phone number if they don’t give it to you? Its hard unless you’re determined tbh which most people aren’t.
Most hackers setup watering hole style attacks, or use phishing which is roughly the same concept. Basically they cast a wide net and see what they can grab, like the browser credentials of Debra from accounting who knows everything about compound interest and nothing about opening an
.exefile in an email. There are some big game hunting groups, and the LinkedIn breach made some waves (see the fappening), but your run of the mill discord-as-a-c2 style hacker isn’t going after rich people.Someone “hacking a phone” likely put a kitchen scale iPhone app on the app store, which when first opened asks for permissions for microphone, camera, text messages, contacts and file storage, and sends all that information to Argentina for a week or so until their app gets banned.
Also, the most likely person to hack your phone seems to be someone in your household, abusive parent or spouse sorta thing. Most common devices to get hacked are laptops, usually windows. Its just kinda hard to hack a phone. Unless you know a lot about compressed image formats and the iPhone messages app apparently because NSO made like 5 zero days in a row out of that.
JoshCodes@programming.devto
Science Memes@mander.xyz•i enjoy high fructose corn syrup tooEnglish
10·1 month agoHi, I’m engaged to someone who studies chickpea and other legumes. Shitloads of money goes into agriculture every year and from my understanding, what you’re describing is being done by some brilliant people (I’m a bit biased). However there’s so many concerns around GMOs doing damage to the environment that it is tightly regulated. Doubly also, Americans don’t have the same ready access to grocery stores that
otherfirst world countries have.Plus the equivalent of flat earthers exist that believe that GMOs will kill us all and we need to go back to eating only what nature created (somewhat hyperbole, there are valid concerns but people have been irrational).
An example is that chickpea and other legumes reintroduce nitrogen into soil after the soil loses vitality, which makes chickpea a good intermediate crop that can be grown in between others. Its high in nutrients and has good yield. So yeah, stop eating corn and eat legumes/chickpea/hummus.
(I’m not the molecular biologist so if I got stuff wrong, sorry, I will pay more attention when my partner speaks)
JoshCodes@programming.devto
Lemmy Shitpost@lemmy.world•When you say you don't like linux on LemmyEnglish
4·1 month agoHey, you’re also heading the right way for a ban… Not liking Linux on Lemmy smh
docker compose down --remove-orphans
JoshCodes@programming.devto
Technology@lemmy.world•Your Phone Isn’t Eavesdropping on You to Show You Ads (It’s Worse Than That)English
1·7 months agoYep sorry, I said a dumb thing.
My point is probably more to do with the marketing around VPNs than anything else. As you very nicely put, there are a thousand ways to track someone without having their IP address. VPNs don’t cover all bases but the marketing teams talk about them like they do.
Amazon can still sell your info to data brokers without having your home ip address: they have your email, name, delivery address and search history as a start.
JoshCodes@programming.devto
Technology@lemmy.world•Your Phone Isn’t Eavesdropping on You to Show You Ads (It’s Worse Than That)English
1·7 months agoI am not OP, I just decided to reply.
JoshCodes@programming.devto
Technology@lemmy.world•Your Phone Isn’t Eavesdropping on You to Show You Ads (It’s Worse Than That)English
8·7 months agoOooo close. It’s a shit algorithm that favours the company that paid the most for the spot. So people rely on paying for a good spot to get promoted on the most minor fucking chance of someone buying their shitty item. I heard someone say the average best item you search for is found 17th place.
They’re scamming the buyer and the seller and profiting off of being terrible for everyone.
JoshCodes@programming.devto
Technology@lemmy.world•Your Phone Isn’t Eavesdropping on You to Show You Ads (It’s Worse Than That)English
45·7 months agoThere are definitely some VPN providers to worry about.
VPNs are a security tool but they don’t protect people as much as they think. They hide DNS traffic your ISP would have received, so that your ISP can’t tell everyone which cuckold or affair site you access (except you probably forgot to turn the VPN on one time or another so…)
Your ISP can still see IP addresses you connect to, they forward all your traffic[I need to proof read before I press post - this is just misinformation]. Good opsec is a nightmare. Ad blocking does more for less cost than getting a VPN will ever do (except for certain human rights circumstances but I’d wager they’re actually going to be careful).My personal tip is use DNS over HTTPS/TLS where possible, and don’t use Cloudflare or Google. Add an ad blocker and it’s far easier to setup and way more cost effective than VPN.
JoshCodes@programming.devto
Technology@beehaw.org•The inarguable case for banning social media for teensEnglish
2·7 months agoSounds like it’s the platforms that are the issue, not the kids. Would you believe that maybe the corporations havent been acting with ours or our children’s best interests at heart and should, shock horror, be forced into doing that? It’s almost like designing social media to be an ad casino shouldn’t have been allowed.
I’ve got no experience with it but at first glance it seems like a very positive direction for the project:
Collaborate, not Compete
We are proud of our community and closely interact with projects around it. If we build a platform feature that can be useful in an upstream project, we prefer to contribute it to that project, rather than keep it in the platform.
You don’t hear that often enough these days, everyone seems to be siloing information.
JoshCodes@programming.devto
cybersecurity@infosec.pub•AI models can generate exploit code at lightning speed
0·7 months agoI’m referencing this:
Keely told GPT-4 to generate a Python script that compared – diff’ed, basically – the vulnerable and patched portions of code in the vulnerable Erlang/OPT SSH server.
“Without the diff of the patch, GPT would not have come close to being able to write a working proof-of-concept for it,” Keely told The Register.
It wrote a fuzzer before it was told to compare the diff and extrapolate the answer, implying it didn’t know how to get to a solution either.
“So if you give it the neighbourhood of the building with the open door and a photo of the doorway that’s open, then drive it to the neighbourhood when it tries to go to the mall (it’s seen a lot of open doors there), it can trip and fall right before walking through the door.”
JoshCodes@programming.devto
cybersecurity@infosec.pub•AI models can generate exploit code at lightning speed
4·7 months agoThe vulnerability is the scary part, not the exploit code. It’s like someone saying they can walk through an open door if they’re told where it is.
JoshCodes@programming.devto
Australia@aussie.zone•From $30 parmigianas to $15 pints, can Australia still afford the pub?English
32·7 months agoParma sounds like a phrase uttered by the absolutely deranged. Even the children here know it’s parmy
JoshCodes@programming.devto
Lemmy Shitpost@lemmy.world•I had no idea y cunt was this powerfulEnglish
24·7 months agoSteve Hughes did a pretty good bit on this - “Go play with your girly tits you Gaylord, I’m going to fuck a man.”
JoshCodes@programming.devto
Selfhosted@lemmy.world•Why is my server using all my Swap but I have RAM to spare?English
7·7 months agoCounter point, set the ‘swappiness’ lower than the default 60. I’ve set mine to 30 and the system boots a lot faster. You could research and consider 10-20.
JoshCodes@programming.devto
Selfhosted@lemmy.world•How to harden against SSH brute-forcing?English
5·7 months ago100% agree, that is a “totally for fun” exercise








So we’re bashing the people who installed Linux now if they used something else first? What, if they’ve ever used windows we should send them to the Gulag? Wtf is this take? Like hey you dumb fucking person who finally figured out how to get away from the corporate software you were taught to use in high school, you are FuCkInG iGnOrAnT for putting yourself in this position in the first place!!1!
Let’s not talk about the multi billion dollar industry spent locking people into an ecosystem from day 1, because blaming high schoolers and teenagers for not switching to an OS best know for running web servers is an awesome use of our time.
Speaking from experience: no one thinks about operating systems as much as we do. We are not the norm. Most people don’t want to use the computer to begin with, but conceded its faster than hand writing everything. The guy who paved my driveway will never install Arch, because he only uses the computer to get paid. My office’s cleaner doesn’t understand how computers can even be unsafe.
When I went to primary school we had windows computers. Same thing in high school. In uni, because I did comp sci, I used Linux and found it was better for me. 350 people went through first year with me. Most of them continued using Windows, although a good chunk used Mac too. Like 10 of us used Linux. It is easier not to switch and that’s not going to change. So can we stop having a go at people for not having the same interests as us, because that’s the only difference.