Skip to content

Kids are short-circuiting their school-issued Chromebooks for TikTok clout

Technology
54 38 0
  • 94 Stimmen
    4 Beiträge
    0 Aufrufe
    P
    The topic is more nuanced, all the logs indicate email/password combos that were compromised. While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no "malware" was installed. The point being it doesn't look great that someone has ANY compromises... But again, anyone who's used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you'll often be notified of all your potentially compromised accounts. [image: 7a5e8350-e47e-4d67-b096-e6e470ec7050.jpeg]
  • Airlines Are Selling Your Data to ICE

    Technology technology
    22
    1
    555 Stimmen
    22 Beiträge
    0 Aufrufe
    G
    Which is the problem. ICE would not be able to legally subpoena these companies for our data, so they buy it from them as a loophole. Using our tax dollars, of course.
  • The Document Foundation is proud to release LibreOffice 25.2.3

    Technology technology
    7
    1
    266 Stimmen
    7 Beiträge
    0 Aufrufe
    somethingburger@jlai.luS
    View -> User Interface -> Tabs It already exists but is nowhere near as good as MS Office (like everything with LO).
  • 360 Stimmen
    24 Beiträge
    0 Aufrufe
    F
    If only they didn’t fake it to get their desired result, then maybe it could have been useful. I agree that LiDAR and other technologies should be used in conjunction with regular cameras. I don’t know why anyone would be against that unless they have vested interests. For various reasons though I understand that it isn’t always possible - price being a big one.
  • Everyone Is Cheating Their Way Through College

    Technology technology
    23
    1
    171 Stimmen
    23 Beiträge
    0 Aufrufe
    L
    i can this for essay writing, prior to AI people would use prompts and templates of the same exact subject and work from there. and we hear the ODD situation where someone hired another person to do all the writing for them all the way to grad school( this is just as bad as chatgpt) you will get caught in grad school or during your job interview. might be different for specific questions in stem where the answer is more abstract,
  • 48 Stimmen
    9 Beiträge
    0 Aufrufe
    F
    Being “locked down” is irrelevant for a device used to read and write on. All those devices are also significantly more powerful than this thing. They all also have keyboard attachments readily available across all sizes and prices. Linux isn’t at all necessary for the use cases the author talks about. Windows would be massively overkill.
  • 14 Stimmen
    2 Beiträge
    0 Aufrufe
    J
    This is why they are businessmen and not politicians or influencers
  • Microsoft's AI Secretly Copying All Your Private Messages

    Technology technology
    4
    1
    0 Stimmen
    4 Beiträge
    0 Aufrufe
    S
    Forgive me for not explaining better. Here are the terms potentially needing explanation. Provisioning in this case is initial system setup, the kind of stuff you would do manually after a fresh install, but usually implies a regimented and repeatable process. Virtual Machine (VM) snapshots are like a save state in a game, and are often used to reset a virtual machine to a particular known-working condition. Preboot Execution Environment (PXE, aka ‘network boot’) is a network adapter feature that lets you boot a physical machine from a hosted network image rather than the usual installation on locally attached storage. It’s probably tucked away in your BIOS settings, but many computers have the feature since it’s a common requirement in commercial deployments. As with the VM snapshot described above, a PXE image is typically a known-working state that resets on each boot. Non-virtualized means not using hardware virtualization, and I meant specifically not running inside a virtual machine. Local-only means without a network or just not booting from a network-hosted image. Telemetry refers to data collecting functionality. Most software has it. Windows has a lot. Telemetry isn’t necessarily bad since it can, for example, help reveal and resolve bugs and usability problems, but it is easily (and has often been) abused by data-hungry corporations like MS, so disabling it is an advisable precaution. MS = Microsoft OSS = Open Source Software Group policies are administrative settings in Windows that control standards (for stuff like security, power management, licensing, file system and settings access, etc.) for user groups on a machine or network. Most users stick with the defaults but you can edit these yourself for a greater degree of control. Docker lets you run software inside “containers” to isolate them from the rest of the environment, exposing and/or virtualizing just the resources they need to run, and Compose is a related tool for defining one or more of these containers, how they interact, etc. To my knowledge there is no one-to-one equivalent for Windows. Obviously, many of these concepts relate to IT work, as are the use-cases I had in mind, but the software is simple enough for the average user if you just pick one of the premade playbooks. (The Atlas playbook is popular among gamers, for example.) Edit: added explanations for docker and telemetry