Jump to content

WereCatf

Member
  • Posts

    9,178
  • Joined

  • Last visited

Everything posted by WereCatf

  1. WereCatf

    It is time to overclock my graphics cards. Wish…

    Firemen dispatched. May the heat be coming from your loins and not your GPU!
  2. WereCatf

    It is time to overclock my graphics cards. Wish…

    What address do I send the firemen and the ambulance to?
  3. Personally, I wouldn't bother with anything older than Intel's 5th gen CPUs or AMD's equivalent, or NVIDIA's 700-series or AMD's equivalent. For RAM, HDDs and the likes, tho, it doesn't really matter as long as it works with whatever CPUs/mobos I have.
  4. If you wanted over-the-top, just plain retarded cooling, you'd sink the cards in mineral oil or similar and then cool the oil with e.g. refrigerators or peltiers to below zero. That said, it's both a retarded idea and not interesting, either. No.
  5. It might be the Windows 10 - feature called "Modern Standby" and you might want to try if disabling it helps: https://www.notebookcheck.net/Useful-Life-Hack-How-to-Disable-Modern-Standby-Connected-Standby.453125.0.html
  6. That, or USB-drives or a premade NAS or similar stuff, yes. Whichever option suits you best, as long as you take backups periodically (or setup some sort of an automatic backup-scheme) and the storage isn't directly connected to your PC at all times -- if e.g. the PSU blew up, it might take both of your regular drives and your backup-drives with it, so it's a good idea to keep them at least partially separated.
  7. Not really, no. There are plenty of drives that work perfectly well for well over a decade -- including some I have in actual, active use myself. The far better strategy is...to have backups. Do not rely on your drives not failing on you, because even a brand-new drive can fail all of a sudden; what you should do is maintain backups of all the stuff you don't want to lose.
  8. I did mention that they have since stopped using ConnMan. Reporting on a practical attack is automatically "anti-Tesla" just because the attack was for a Tesla? How would one report the news without it being "anti-Tesla", then? Should they avoid mentioning which manufacturer was in question just to avoid offending your sensibilities? No, that's a childish take on this. Reporting on actual facts is exactly what news should be doing.
  9. Summary Researchers late last year demonstrated that they could remotely hack a Tesla and do things like e.g. open doors, change seat positions, controlling the AC and modify steering and acceleration modes. Quotes My thoughts Before people start yelling about Tesla being used for splashy headlines again, this attack was developed for PWN2OWN 2020, of which Tesla was a part of. Also, Tesla isn't the important part here, but rather how easy it was to gain access to a modern "smart" car entirely remotely; it's not just possible, but rather likely that cars from other manufacturers are similarly affected and that's a rather scary thought. Tesla has stopped using ConnMan, but who knows how many vulnerabilities lie in its replacement? What the article in the sources doesn't mention is that this hack relies on the fact that Teslas were (are?) configured to automatically connect to any WiFI AP with the SSID of "Tesla Service" with a hardcoded passkey (see the PDF-link) that can be simply extracted from the firmware by naughty parties. That's a really, really stupid design-decision, even if it was made for the sakes of convenience. Sources https://www.securityweek.com/tesla-car-hacked-remotely-drone-zero-click-exploit https://kunnamon.io/tbone/tbone-v1.0-redacted.pdf
  10. Use float() instead of int(), if you want to convert decimal-numbers.
  11. To be quite frank, it came out quite nice!
  12. WereCatf

    My mood today:

  13. No, it doesn't. RAM loses its contents as soon as power goes out, but flash - memory has to retain its contents for a long time without any power, and so they're electrically nothing alike.
  14. Yes, like e.g. Macrium Reflect allows you to migrate everything to an SSD as-is.
  15. You need an SSD and more RAM. There's nothing else you can do hardware-wise, unless you just replace the entire laptop.
  16. You boot into Linux, then do sudo lsusb -v|grep -i switch and see if any of the ports mention that it does support switching of power. That said, in all likelihood your mobo will not support such. I am only aware of the chipsets in USB-hubs supporting this feature and I have not heard of any mobo-chipset supporting it. Then, in the entirely unlikely case that the chipset actually did support it, you'd take a look at e.g. https://github.com/mvp/uhubctl and implement something similar for Windows.
  17. Technically yes, there are USB-chipsets that do support such. Alas, whether yours does or not is up in the air.
  18. Why not? It's perfectly alright to call companies out on their bullshit. Besides which, they're not people, you can't offend a company. No, if anything, Linus goes too easy on all these companies; IMHO, he should use far fouler language when talking about and/or addressing them.
  19. You'd typically want airflow for case-fans and static pressure for heatsinks and radiators, just like Noctua's page says as well.
  20. No, you need to write the script manually.
  21. It's not really like DeviantArt. DA is more for hobbyists and people of all skill-levels, whereas ArtStation specifically caters more to actual professionals -- people who make their living with creative, visual works. Whether you consider one or the other to be better, then, depends on you.
  22. Yes, that's the job of the application that has such secure data. The application would typically call an OS API, which would then set up the page-tables accordingly. That would, again, require the attacker to be in a position of altering another process's code and, if they are in such a position, then it'd be pointless, since they could already access that data directly!
  23. That's not how it works. These are side-channel attacks that allow for reading of data, they don't allow you to modify data, let alone do privilege-escalation. You'd need to be able to modify the CPU's internal tables in order to change the security-bits on them.
×