1
15
2
15
submitted 5 years ago by yarmo@lemmy.ml to c/technology@lemmy.ml
3
0
submitted 4 years ago by tensor@lemmy.ml to c/technology@lemmy.ml
4
1
Ken Thompson's Unix password (leahneukirchen.org)
submitted 4 years ago by Lofenyy@lemmy.ml to c/technology@lemmy.ml

"Somewhere around 2014 I found an /etc/passwd file in some dumps of the BSD 3 source tree, containing passwords of all the old timers such as Dennis Ritchie, Ken Thompson, Brian W. Kernighan, Steve Bourne and Bill Joy."

5
1
6
2

Tor released Snowflake, a system to defeat internet censorship. People who are censored can use Snowflake to access the internet. Their connection goes through Snowflake proxies, which are run by volunteers.

7
1
submitted 4 years ago by norz@lemmy.ml to c/technology@lemmy.ml

“#Safari occasionally receives a list of hash prefixes of URLs known to be malicious from Google or Tencent, choosing between them based on the device's region setting (#Tencent for #China, #Google for other countries). Hash prefixes are the same across multiple URLs, which means the hash prefix received by Safari does not uniquely identify a URL.

When the fraudulent website warning feature is toggled on, Safari checks whether a website URL has a hash prefix to match the hash prefixes of malicious sites. If a match is found, Safari sends the hash prefix to its safe browsing provider and then asks for the full list of URLs that have a hash prefix that matches the suspicious one.

When Safari receives the list of URLs, it checks the original suspicious URL against the list, and if there is a match, Safari shows the warning pop up suggesting users stay away from the site. The check happens on the user's device, and the URL itself is not shared with the safe browsing provider, but because Safari communicates directly with the safe browsing provider, the providers do receive device IP addresses. ”

8
-1
What's New in Google Chrome 78 (www.hashtagtechgeek.com)

What's new in the Google Chrome 78 release.

9
1
How to find the WiFi Password (www.hashtagtechgeek.com)

Use these tricks to find your forgotten WiFi password.

10
1
11
1
What's new in Aurdino Pro IDE (www.hashtagtechgeek.com)

Read more about the new features in the Aurdino Pro IDE

12
1
13
1
14
1
15
1
16
1

Tik-Tok introduces new features to compete with Facebook, and Instagram.

17
0
18
1
19
1
20
1

Have you ever thought of having a fingerprint reader enabled laptop?

21
0
Abandonem o Zap! (passapalavra.info)
submitted 4 years ago by kuarup@lemmy.ml to c/technology@lemmy.ml

#foss #whattsapp #privacy #privacidade #softwarelivre #gafam

22
0
submitted 4 years ago by pfefferle@lemmy.ml to c/technology@lemmy.ml
23
10
24
0
25
3
view more: next ›

Technology

33225 readers
688 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS