flying_monkies

joined 1 year ago
[–] flying_monkies@kbin.social 6 points 6 months ago (1 children)

It ain’t that easy to shoot down stealth aircraft.

Hell, it's not easy to shoot down non-stealth aircraft

The pilot evaded all six missiles while not being able to deploy any chaff/flare countermeasures.

[–] flying_monkies@kbin.social 4 points 7 months ago

Let me know when it becomes a penny stock...

 
[–] flying_monkies@kbin.social 1 points 1 year ago (2 children)

One hit wonder.

[–] flying_monkies@kbin.social 13 points 1 year ago

Please show me where any country is "shitting themselves over Russia" after the master stroke in self destruction Russia has displayed in Ukraine?

[–] flying_monkies@kbin.social 9 points 1 year ago* (last edited 1 year ago)

How did they justify this statement? A press release from Putin.

Effectively, yes.

The consortium just linked to the original story from Indian Punchline (the author's personal blog) where the author quoted the statement from a TASS article.

It's not hard hitting, factual news. It's an OpEd piece from a blogger.

If we wrapped Robert Parry's corpse with copper wire and surrounded his casket with magnets, we could probably power a small city with the electricity from him turning over in his grave at how far Consortium News has fallen in publishing articles like this.

[–] flying_monkies@kbin.social 4 points 1 year ago* (last edited 1 year ago)

If you set up hardware encryption, be sure to change the master password and set the security level to maximum.

Be aware, this password is different than the Physical Secure ID (PSID) printed on the front of the disk. PSIDs are used when the release to reset command doesn't work, typically due to key issues, and the drive gets "locked".

You use the PSID to run a revert to factory defaults command, unlocking the drive. Since this triggers the drive to release its' key, the drive is considered "cryptographically erased" when you do this.

If you revert the drive, data on it is unrecoverable.

If you're going to revert a drive, I suggest using a QR Code reader to get the PSID off the drive. Some venders are sadists with the font they choose making it so much fun to figure out if it's a 1, l i I I O or 0...

[–] flying_monkies@kbin.social 24 points 1 year ago (2 children)

It sounds like the article is an update to the age old performance issue discussions between hardware and software RAID solutions.

If you use a software solution for anything where there's a dedicated hardware solution, the software solution is always slower due to CPU overhead.

Article recommendation boils down to: If you're going to use encryption, and you want your full disk speed, use a hardware encryption solution. In their test their hardware supported OPAL.

[–] flying_monkies@kbin.social 3 points 1 year ago (1 children)

SSDs, unless you buy a specifically encryption supported drive, are not encrypted. If it doesn't indicate SED, SED non-FIPS or a FIPS certification level, the drive doesn't have an encryption circuit.

[–] flying_monkies@kbin.social 9 points 1 year ago (1 children)

Most of SSD already has good encryption methods

Unless you purchase a SED-non FIPS or FIPS SSD, no, they don't

and an easy way to safely wipe data without re-writing each byte.

ATA Secure Erase is a god send for SSD.

[–] flying_monkies@kbin.social 11 points 1 year ago (1 children)

A little duct tape, some Bondo... It'll be good as new.

[–] flying_monkies@kbin.social 7 points 1 year ago (1 children)

You're correct, it was the truck

 

Any future effort to reinforce Russian defenses in one sector could come at the expense of Russian defenses in another sector.

 

"Crimea now cannot be called a safe haven," a former Ukrainian intelligence agent told Newsweek after a week of high-profile attacks.

view more: next ›