this post was submitted on 29 Apr 2025
547 points (98.4% liked)

Technology

69449 readers
3992 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 
  • In December, an investigation by Tom's Hardware found that Recall frequently captured sensitive information in its screenshots, including credit card numbers and Social Security numbers — even though its "filter sensitive information" setting was supposed to prevent that from happening.
you are viewing a single comment's thread
view the rest of the comments
[–] arakhis_@feddit.org -5 points 16 hours ago (1 children)

You for sure feels so good being this helpful. But TIN really don't understand SHT if you use so many Technical terms(TT)

But there's a solution in brackets I just presented, that's commonly accepted in academia if you still want to use TT like that

[–] Septimaeus@infosec.pub 5 points 10 hours ago* (last edited 4 hours ago)

Forgive me for not explaining better. Here are the terms potentially needing explanation.

  • Provisioning in this case is initial system setup, the kind of stuff you would do manually after a fresh install, but usually implies a regimented and repeatable process.
  • Virtual Machine (VM) snapshots are like a save state in a game, and are often used to reset a virtual machine to a particular known-working condition.
  • Preboot Execution Environment (PXE, aka ‘network boot’) is a network adapter feature that lets you boot a physical machine from a hosted network image rather than the usual installation on locally attached storage. It’s probably tucked away in your BIOS settings, but many computers have the feature since it’s a common requirement in commercial deployments. As with the VM snapshot described above, a PXE image is typically a known-working state that resets on each boot.
  • Non-virtualized means not using hardware virtualization, and I meant specifically not running inside a virtual machine.
  • Local-only means without a network or just not booting from a network-hosted image.
  • Telemetry refers to the data harvesting apparatus. Most software has it. Windows has a lot. Telemetry isn’t necessarily bad but it is easily abused by data-hungry corporations like MS, so disabling it is a precaution.
  • MS = Microsoft
  • OSS = Open Source Software
  • Group policies are administrative settings in Windows that control standards (for stuff like security, power management, licensing, software and file system access, etc.) for user groups on a machine or network. Most users stick with the defaults but you can edit these yourself for a greater degree of control.
  • Docker lets you run software inside “containers” to isolate them from the rest of the environment, exposing only what they need to run, and Compose is a related tool for defining one or more of these containers, the resources they need, how they interact, etc. To my knowledge the only equivalent for Windows to date is Wine and its successors like Proton.

Many of these concepts are IT-related, as are the use-cases I had in mind, but the software is simple to use if you pick one of the premade playbooks. (The AtlasOS playbook is popular among gamers, for example.)

Edit: added docker