There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

Commented

As a linux user, do you know about/use openwrt?

I have many nerdy friends who have been Linux users for ages. But most of them don’t know such a thing as Openwrt exists or have never bothered to give it a try. It’s a very fun piece of software to play with and can be extremely useful for routing traffic. Wondering why it isn’t more popular/widely used.

Why is TikTok seen as privacy invading and bad, but Facebook is fine?

I’m not here to claim that Tiktok is completely harmless, or that it’s even a good site. I’m sure they absolutely do collect as much personal information as they can, and I’m sure they give it to the Chinese government whenever they ask. But I don’t understand how Meta and Facebook are meant to be any better? There’s...

(Constructively) What is your least favorite distro & why?

I’ve been distrohopping for a while now, and eventually I landed on Arch. Part of the reason I have stuck with it is I think I had a balanced introduction, since I was exposed to both praise and criticism. We often discuss our favorite distros, but I think it’s equally important to talk about the ones that didn’t quite hit...

It's funny how google pretends the music on YouTube isn't straight up piracy and everyone just goes along with it

Most people have extremely weird ideas of what’s considered piracy and what isn’t. Downloading a video game rom is piracy, but if you pay money to some Chinese retailer for an SD card containing the roms, that’s somehow not piracy. Exploiting the free trial on a streaming site by using prepaid visa cards is somehow not...

How does ransomware get into major networks, such as schools or other large public agencies?

I read an article about ransomware affecting the public transportation service in Kansas, and I wanted to ask how this can happen. Wikipedia says these are “are typically carried out using a Trojan, entering a system through, for example, a malicious attachment, embedded link in a phishing email, or a vulnerability in a...

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines