This is awesome. Didn’t know there were ESP32 with integrated e-ink screens.
I still miss a cheap ESP32 device that can run on an18650 or two for a longer period.
This is awesome. Didn’t know there were ESP32 with integrated e-ink screens.
I still miss a cheap ESP32 device that can run on an18650 or two for a longer period.
Yup. /r/Datahoarder guided me right. Got two of the recommended model of MyBook and shucked them. This was 2-3 years ago. Disks are still going strong in my NAS.
That chart doesn’t say anything about system resource usage.
Edit: found the performance chart now. Still no explanation on what performance tests(more than two sentences) they performed and how the scoring was applied.
Interesting. Do you have links that support your claims that I can read up on?
Yeah, that was you continuing to show how inexperienced you are.
For a remote exploit to work the computer or device has to expose ports to the network your computer is connected to.
“Remote” means that the vulnerability does not require local access. So if your friend connects his infected device to your wifi, all devices connected to the same network essentially are at risk, depending on what’s listening on the devices and what vulnerabilities they have.
Your idea about avoiding bad websites is ridiculous. History is full of examples where third party ads had been created to infect one way or another. That’s ads that users on legitimate site were exposed to. That’s just one little example. There have been numerous examples of malicious sleeping JavaScript code that suddenly wakes up and contacts it’s command-and-control server and then download malicious JavaScript code to unknowing site visitors.
Furthermore, you didn’t understand my question. Of course antivirus is able to stop malware it recognizes that enters through a remote exploit. The user with antivirus would at least have a chance of knowing that something was up each time and attempt to infect was made.
You on the other hand would sit there clueless with your little zombie computer and laugh at all them script kiddies.
But hey… You just continue trying to infect others around you with bad security advice and have a good day. I’m outta here.
I explained what a remote exploit was and gave examples of remote exploits.
Are you claiming that antivirus isn’t able to detect malware entering through an remote exploit?
Either you’re just ignorant or your working in the Russian malware industry.
Remote exploits doesn’t have anything to do with you running any infected executables. It’s about vulnerabilities in executables that you are running. Read up on the zx vulnerability or the log4j vulnerability.
One really really old attack vector is a buffer overflow attack. For example, if you’re running a clean VLC to watch a movie and your VLC is older than version 3.0.12 you’re at risk. The video file, that you “purchased” on PirateBay, could have been manipulated to crash VLC and force VLC run a specific payload in the video file. If that payload is ransomware it’s game over for you.
Yeah, just like wearing a seatbelt doesn’t guarantee that you don’t get injured, antivirus doesn’t guarantee that your computer won’t get infected.
But there’s no doubt about the usefulness of both seatbelt and antivirus.
I fully agree.
But my main point was that they’re taking an extreme risk if they’re running without active antivirus and access the network in one or another way.
Yes. But the discussion was about not running any since it killed performance.
If your computer is network connected you really really need antimalware running. In theory, a game server could be exploited and controlled to inject malware into game clients ( = you playing online).
If you use a browser to access internet, there has been malware infected ads that infect your computer when you visit legitimate web sites.
If you get infected, the malware most likely won’t do anything that makes you notice it. It all depends what the purpose of the malware is.
Ransomware? Then it stays hidden until it has encrypted all your files and then it pops up telling you to pay or you won’t be able to use your computer.
Collecting useful passwords? Getting full access to your Steam account is nice. Got some awesome weapons and armor in the MMORPG you play? That’s something they theoretically would script to be able to steal from you.
Or maybe the malware just stays hidden for now, contacting it’s control center now and then to see if there is any instructions.
Malware is business. The people behind it are businessmen and you are part of what they sell.
If you have a fairly modern computer there shouldn’t be that much impact on the performance.
You don’t want to have any active scanning for threats, like antivirus? If so, why?
You want to have both hands free while moving or an extra dose of speed to go faster? With the Mobility Plus Package you can activate a variety of clever additional functions in the Mobility App.
With the Mobility Plus Package you can increase the support speed from 6 km/h to 8,5 km/h and benefit from the Cruise Mode that allows you to keep a permanent speed with only one deflection on the push rim.
Holy fuck!?!? The wheelchair is actually actively crippled if you don’t pay?
If you are able to crack software, this is the time to stand up and do actual real good for humanity !
This makes me so angry.
I’m a paying customer and I’ve never had this problem.
If I were to choose infrastructure today and only looked at the technology and stability I would choose Z-wave over Zigbee, WIFI and Matter any day.
But… The pricing on Z-wave devices is a showstopper and it will eventually kill it.
Along with the termination of perpetual licensing, Broadcom has also decided to discontinue the Free ESXi Hypervisor, marking it as EOGA (End of General Availability).
Wiktionary: Adjective perpetual (not comparable) Lasting forever, or for an indefinitely long time.
Hello ProxMox here I come!
Depends on where you live. Not open source but Ikea has one.
https://www.ikea.com/se/sv/p/knycklan-elektronisk-diskmaskinsavstaengning-20425724/
You can set the camera to store the pictures as JPEG. I am happy with JPEG for my holiday photos. Just check that you have the best quality setting since JPEG uses lossy compression.
While HEIF is not the doomsday thing some describes it as, it currently is somewhat problematic.
There are for example problems, originating in differences in implementation between different hardware vendors, with 10-bit and HDR.
I replied to a statement about Heif being an Apple image format. It is not.
Furthermore, HEIF is something that most major mobile device vendors support. Some, like Samsung, even sets it as default on some of their devices. So the whole “Apple always supporting not open standards” is just tiresome at this point.
99.999% of all Android users are defacto locked in by Google. Yes, Android might be open but Play services are not. Google works hard to lock in Android users.
At least Apple are open and honest about locking in iOS users.
What device/ Operating System are you trying to watch the images on?
Both are CL 19 do you should be fine.