Yeah Mac has dd too, I often forget about the terminal existing there. I wish Ventoy for Mac was a thing tho.
Yeah Mac has dd too, I often forget about the terminal existing there. I wish Ventoy for Mac was a thing tho.
It reminded me when I told a coworker he could force the Windows shutdowns with the command 'shutdown -p -f" from either a Run.exe or a cmd window.
Then he said it wasn’t working, and that the cmd window would just open and close quickly but no shutdown.
Imagine my surprise when he was doing shutdown -pf .
I only tried to use it once, and same. 150MB of a Web app to copy an ISO? I think I was using a Macbook to flash it and decided to use ventoy instead, with my PC.
“The attack against the OpenSSH client (CVE-2025-26465) succeeds regardless of whether the VerifyHostKeyDNS option is set to “yes” or “ask” (its default is “no”), requires no user interaction, and does not depend on the existence of an SSHFP resource record (an SSH fingerprint) in DNS,” explains Qualys.
Thankfully is not enabled by default…
Your post reminded me of my childhood, of how I had a PSP with a CFW and a GBA emulator, that made me look for hack roms, and I learned that there’s a digimon Pokémon hack ROM lol.
In the white house being friends with the hosts.
Basically, I specifically want cold storage, and not cloud. I will only add, not delete from it. And I don’t want it encrypted.
I have a client with a photographic studio. To give you an estimate, his data is around 14TB of mostly camera pictures with approximately 20 years or history and the owner believe it or not, relies on multiple external hard drives for cold storage, he has a 2TB Seagate thats like 2011-2012 old which still works.
To put in a cupboard tho, M disc is your best bet.
Was able to get rid of it via safe mode and finding a cleaning tool from rather niche (region-focused) sources.
Is always a Spanish, Portuguese brasileiro or Cyrillic software, I swear.
The first time I heard it, it meant that it was a vuln present since the launch of that version unknown to the publisher, so meaning on day 0 it was possible to exploit it.
Then, when I was studying for a certification I learned they changed the definition to mean it was the number of days a vendor had to patch that vulnerability, and in some cases after being patched these vulnerabilities would get a name assigned to them.
And now, is more of a clickbait word for articles.
Rips Bong