Skip to content

The Insider News

The Insider. Your Daily News

This category can be followed from the open social web via the handle the-insider-news@forum.codeproject.com

33.7k Topics 99.9k Posts
  • Taco Bell rethinks AI drive-through after man orders 18,000 waters

    1
    0 Votes
    1 Posts
    13 Views
    No one has replied
  • Linux safe?

    5
    1 Votes
    5 Posts
    280 Views
    E
    Note: I'm discussing desktop GNU/Linux in my response. If you run a server exposed to the Internet, you or your administrative team should have the knowledge needed to make it secure. If not, you proceed at your own risk. No, Desktop GNU/Linux not just like Windows. You're only unsafe if you don't learn and follow best practices in GNU/Linux. Always create and use a regular (non-root) user account for daily computer use. In most distributions, when you run the installer, it creates a user account as well as an administrative account so you can perform non-privileged activities such as surfing the Internet and using email,etc. When you install updates, you will be asked to enter your administrative (root) password. When you perform any administrative activity (changing system configuration, editing files not in your user-space (under /home/[your username]), etc. Alternatively, many distributions allow you to bypass creating an administrative (root) account, and adds your user account to the wheel group so you can use the sudo command in the terminal while graphical software requiring administrative permissions will ask for your user account password (my preference). As for exploits, crackers find software security weaknesses they can take advantage of by creating scripts or apps they use to exploit those weaknesses. In GNU/Linux most such vulnerabilities are discovered and patched in time frames measured in days or weeks as opposed to Windows where the time frame can be measured in periods as long as months or years. When it comes to targeted attacks, crackers don't usually target the average desktop GNU/Linux user. Notable exceptions include government employees, users who work at organizations with an Internet presence, and who have administrative access to the organization's Internet-facing resources. As for outdated software, most GNU/Linux distributions provide regular and frequent software updates, It is the responsibility of the user to perform frequent system updates. Note that when you perform an update on your GNU/Linux system, all the installed software will be updated (system and applications) provided you install software using only your distribution's software installer (no third-party software). Regarding social engineering, I trust nothing coming from the Internet. I delete email messages coming from senders I don't know, and before I click on any link in messages from sources I know, or on websites I visit, I check that the URL a hyperlink will send me to matches its label. I use the Thunderbird email client, and the Firefox web browser. Both display the URL of a hyperlink in the status bar at the bottom of the window or in a pop-up dialog/bubble. Admittedly, GNU/Linux has a few security issues, but they are very difficult to exploit if the system is correctly configured, and the majority of distributions correctly configure your system for you at install time. Unless you use SSH or something similar to connect to external computers/servers over the Internet, your system should be very secure out of the box. I don't use SSH here and I don't know how to configure it, but if I ever need it, I'll take the time to learn how to make it secure for my needs before opening any ports for it. The bottom line here is that GNU/Linux is significantly more secure than Windows following installation. Both OSes are at their most secure when they are properly maintained and kept as up to date as possible. I dual boot Windows 11 with Garuda GNU/Linux here, and I like both OSes, although I find that I have significantly greater freedom to customize my GNU/Linux User Interface to my liking than I have with Windows 11. Ernie
  • Visual July 2025 (version 1.103)

    com announcement
    1
    1 Votes
    1 Posts
    68 Views
    No one has replied
  • 0 Votes
    1 Posts
    39 Views
    No one has replied
  • Linux not as safe as it used to be

    com linux security
    13
    0 Votes
    13 Posts
    314 Views
    N
    open source = providing thief with a complimentary house key ===================================================== The grass is always greener on the other side of the fence
  • 0 Votes
    14 Posts
    120 Views
    K
    I think he "used to be technical", but he's mostly been "the business guy" for a while. There must be others...I keep hoping. :sigh: At least I hope there isn't just someone putting price stickers on everything in preparation for the yard sale. TTFN - Kent
  • Sharing is caring

    android com
    5
    0 Votes
    5 Posts
    51 Views
    O
    For developers yes. For non-developers it was a mystery.
  • Something Massive Is Shifting Deep Inside the Moon

    question
    9
    0 Votes
    9 Posts
    104 Views
    O
    Every Dr. Who fan knows the moon is an egg. [The Moon Hatches? | Kill the Moon | Doctor Who - YouTube](https://www.youtube.com/watch?v=pHOnGSFzd3Y&t=151s)
  • Speaking of vacuums...

    com
    3
    0 Votes
    3 Posts
    44 Views
    N
    They are late[^] :rolleyes: :laugh: :laugh: M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.
  • Because old habits are hard to break

    csharp com announcement
    15
    0 Votes
    15 Posts
    145 Views
    RaviBeeR
    We'll know soon. /ravi My new year resolution: 2048 x 1536 Home | Articles | My .NET bits | Freeware ravib(at)ravib(dot)com
  • CodeProject mail addresses seem down

    design com graphics iot
    1
    0 Votes
    1 Posts
    12 Views
    No one has replied
  • Hacked Vacuum

    com
    2
    0 Votes
    2 Posts
    39 Views
    J
    That's actually kind of funny (not the slur part), should've had something equally diabolical, like [insert annoying tune here] played over and over. "the debugger doesn't tell me anything because this code compiles just fine" - random QA comment "Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst "I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
  • Deep Learning - Nobel Prize

    game-dev announcement learning
    5
    0 Votes
    5 Posts
    60 Views
    K
    Yeah, between the physics and chemistry[1] prizes, it really seems like the committee thought, “that AI thing is big, we should do something”. The peace prize seems often hit or miss (all three non-science ones IMO). The Obama one was just ridiculous. This year’s seems reasonable-ish. [1] the chemistry one makes more sense, but it does sound like it hasn’t had much benefit yet[^]. TTFN - Kent
  • Which programming languages use the least electricity?

    data-structures question
    10
    1 Votes
    10 Posts
    89 Views
    H
    Daniel Pfeffer wrote: Your suggested method is good for "black box" testing, but won't separate application vs kernel power usage, for example. If one really wants to measure the application's power usage, one should separate out the kernel's power usage, to say nothing of other applications running simultaneously. That's why I suggested a realtime system would give better results. You don't really have much in the way of context switches and other kernel overhead, or if you do, you can absolutely control it. Check out my IoT graphics library here: https://honeythecodewitch.com/gfx And my IoT UI/User Experience library here: https://honeythecodewitch.com/uix
  • storing data in the internet itself

    com
    1
    0 Votes
    1 Posts
    19 Views
    No one has replied
  • Cloud architects: Try thinking like a CFO

    html com hosting cloud business
    2
    0 Votes
    2 Posts
    35 Views
    N
    As an architect I would like to think like an Amoeba for now, trying to solve that complex amoeba bug :laugh: ===================================================== The grass is always greener on the other side of the fence
  • NIST proposes barring some of the most nonsensical password rules

    com security
    2
    3 Votes
    2 Posts
    37 Views
    O
    Oh, good. We'll finally stop having to remember our first pet's name. Obligatory [xkcd: Password Strength](https://xkcd.com/936/)
  • 0 Votes
    2 Posts
    27 Views
    P
    Definitely not in his office then.
  • What’s next for Azure API Management?

    html com cloud json question
    1
    1 Votes
    1 Posts
    18 Views
    No one has replied
  • Moving DevOps Security Out of the 'Stone Age'

    com sysadmin devops security
    1
    2 Votes
    1 Posts
    16 Views
    No one has replied