Search:

Type: Posts; User: Luke; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.07 seconds.

  1. All that consumer content has to be produced on something

    All that content (free or paid) that people consume on smartphones and tablets has to be created somewhere. People can and do watch my videos on phones, but I cannot produce them on one. Until a...
  2. Gtk2 and GTK3 themes can be matched-with a lot of images

    I've been playing with my old Gtk3 port of a modified UbuntuStudio theme since Gtk3.14 came out in Vivid and broke support for the old style "background image" check and radio button internal boxes....
  3. So GNOME will remove metacity-1 themes from their theme packages

    This will have consequences for anyone running GNOME themes on GTK3 apps outside of GNOME. Unity and Cinnamon users will need a separate metacity-1 theme in any theme originally written for GNOME...
  4. Replies
    6
    Views
    1,424

    Fixed as of January

    This bug was fixed, I think it was later in December simply because I don't remember any test/rollback session this month. Wasn't an issue very long and thankfully was quickly found and fixed.
  5. When protest is outlawsd, only outlaws can protest

    When protest is outlawsd, only outlaws can protest-rather like trying to outlaw guns. In countries where protest leads to live ammunition fired by police or major jail time, fully armed insurgencies...
  6. Some things go better in "meatspace"

    Many on this board have stormed buildings and put enemies under siege in games, I've done it in real life.
  7. What do I do? Anticapitalist activist video

    I embed with protests, some of them very intense, and shoot video. Some are militant protests that include storming buildings and directly defending our comrades from arrest, such as the Mayday 2013...
  8. Closed source is an issue where security is a concern

    In cases where security against state-level attackers is an issue, the more closed-source software from inside your own country you run, the greater the danger that one or more programmers took a...
  9. Replies
    112
    Views
    6,603

    Once again, this shows I made the right choice with AMD for video editing

    These results show the chip sucks for gaming and other single or double threaded tasks, but perfroms extremely well for both FFMPEG and libx264. The one thing I do that is performance-critical is...
  10. Replies
    27
    Views
    1,955

    A counter to this attack

    This can be countered with a custom dracut (or any) initramfs with a non-standard program calling cryptsetup and non-standard prompts which are published nowhere. A published program for this could...
  11. One OS to rule them all?

    From what I've been seeing here, some seem to think the developers of systemd are gunning to create a whole distro of their own, from "kernald" all the way to "browserd." Of course, if this were...
  12. Replies
    27
    Views
    1,955

    A "stadard distro" Evil Maid is easily countered

    If the only "Evil Maid" attack that was a fast-acting danger was a standard one for common distros, defeating it would be as simple as having your own disk decryption script that runs first or...
  13. Replies
    20
    Views
    1,256

    "Storage being cheap" is relative

    For those of us who do non-monetized video, storage is still ferociously expensive. Consider having a 6TB filesystem half full of raw clips, and an off-site backup for everything. That is six 2 TB...
  14. Bare link reminds me of an old practical joke

    I always presume a bare link to be malicious or at best spam, and never post links without descriptive plain text. You should also hover on all links to read the URL before committing to them. Even...
  15. Replies
    27
    Views
    1,955

    Limitations of /boot on flash, other vectors of attack

    This approach works, but quickly gets hard to manage if you are dealing with multiple encrypted systems. I've done it myself during high-security events but I now consider hardware keyloggers the...
  16. Replies
    27
    Views
    1,955

    One more point: avoid wireless keyboards with encryption

    (cannot edit after 5 min)
    Possibly the worst mistake you can make with encryption is a one word passphrase, but second to that is to use a wireless keyboard instead of USB or PS2. A unencrypted...
  17. Replies
    27
    Views
    1,955

    Every move has its counter, but encryption can be vital in some cases

    OK, an encrypted disk may be 20% slower. I've gotten acceptable results with encryption even on a 450mhz Pentium III, the main impact being that VGA video becomes just slighty too heavy to play back...
  18. Replies
    202
    Views
    34,288

    I've never HEARD of an individual user software patent lawsuit

    I've never HEARD of an individual user software patent lawsuit, not in my entire life. Remember how GIF nearly
    sank under false rumors of demand letters to web hosts using the format? Your hard...
  19. Replies
    202
    Views
    34,288

    Unjust laws should be defied

    Actually, we can defy laws aimed at keeping monopolies rich. Justification is the efforts they put into destroying alternatives they do not control. Even the US Patent office recognizes the...
  20. Replies
    20
    Views
    1,256

    Yet another reason to always have offline backups

    In the world of computers, there will always be bugs. Some of them, such as kernel bugs, will corrupt filesystems. Others can erase files when
    something happens the programmer didn't think about....
Results 1 to 20 of 100
Page 1 of 5 1 2 3 4