• 0 Posts
  • 71 Comments
Joined 9 months ago
cake
Cake day: December 30th, 2023

help-circle
  • survivalmachine@beehaw.orgtoMemes@lemmy.mlMe irl
    link
    fedilink
    arrow-up
    2
    ·
    5 months ago

    I can’t dispute that. I’m not a Word person. I live in Excel and often have half a dozen people working in the same file without issue, but that’s much more logically structured than a Word document. Google’s team sites are also disjointed and janky af compared to Sharepoint.








  • This was not allowed before. Until just recently, the technology didn’t exist to place icons anywhere in the grid. They would automatically smoosh up into orderly rows starting at the top-left with no gaps between icons. Apple is continuing to develop cutting edge innovation, though, and now you will be able to leave entire rows and columns empty, or any specific icon space you choose!









  • It depends on what you interpret kneeling to mean. In the US, kneeling for the flag or kneeling for the national anthem is a form of protest when tradition dictates that you should stand with your hand over your heart. In recent years, the act has made news due to NFL players (starting with Colin Kaepernick) kneeling in protest of police brutality and racial inequality in the US. It is not an act of reverence as if you were kneeling before a ruler or deity.

    Kneeling for the US flag and supporting communism/socialism and LGBTQ rights are all very leftist concepts.



  • You might start googling things like “OSINT handbook” or “OPSEC guide” and see what people put together to protect yourself from data-mining, fingerprinting, and various other ways to protect your personal information.

    Open Source Intelligence (OSINT) is the practice of using freely-available resources to collect information on something/somebody. Learning about the tools used to perform OSINT searches is a good first step to determine which databases you may want to scrub yourself from.

    Operations Security (OPSEC) is a military term that involves the security and protection of any data – classified or unclassified – that could potentially be used against you. OPSEC sounds exactly what you’re looking for, but I mention both terms because looking at potential attacks from both a red team (attacker) and blue team (defender) is a good practice to make sure you’re not missing any vulnerabilities (in other words, even if your only goal is defense, it is beneficial to think like an attacker and visualize how you would attack yourself).

    One such result of a search shows John Troony’s Opsec for the Paranoid gist.

    Some example of people-finder sites like LexisNexus from his document would be:

    ## People-Finder Sites
    
    - 	BeenVerified: http://www.beenverified.com/
    - 	DOBSearch: https://www.dobsearch.com/
    - 	Intelius: http://www.intelius.com/
    - 	LexisNexis: http://www.lexisnexis.com/en-us/products/public-records​.page
    - 	Spokeo: http://www.spokeo.com/WhitePages: http://www.whitepages.com/
    - 	WhitePages: http://www.whitepages.com/
    

    But the nearby sections in that document may be of use to you, like “Opt out of Data Mining”.

    OSINT/OPSEC is a giant rabbit hole you can go down, and you can get as paranoid as you want – scrubbing social media sites or poisoning the well of sites that collect data indiscriminately and don’t let you remove it, all the way to the ultra-paranoid burner phones and entire false identities (as long as you hopefully stay within the bounds of what is legal in your country or at least keep your laws in mind when you do step outside of the law). If you are interested in stuff like that, you might start looking at things like The Hitchhiker’s Guide to Online Anonymity.


  • The POSIX standard is more portable. If you are writing scripts for your system, you can use the full features in the main man pages. If you are writing code that you want to run on other Linux systems, maybe with reduced feature sets like a tiny embedded computer or alternates to gnu tools like alpine linux, or even other unixes like the BSDs, you will have a better time if you limit yourself to POSIX-compatible features and options – any POSIX-compatible Unix-like implementation should be able to run POSIX-compliant code.

    This is also why many shell scripts will call #!/bin/sh instead of #!/bin/bash – sh is more likely to be available on tinier systems than bash.

    If you are just writing scripts and commands for your own purposes, or you know they will only be used on full-feature distributions, it’s often simpler and more comfortable to use all of the advanced features available on your system.