Seriously! I was so relieved when I reached the end of the headline
Seriously! I was so relieved when I reached the end of the headline
EAP is a wrapper for a bunch of different protocols. EAP-MSCHAPv2, EAP-TLS, etc. If you have access to the network settings on a Windows machine you may be able to get more information there.
Also, try stack exchange: https://askubuntu.com/questions/279762/how-to-connect-to-wpa2-peap-mschapv2-enterprise-wifi-networks-that-dont-use-a-c
Not gonna lie, once you’re getting past single button combos, I’m mentally checking out. Ctrl+K and Ctrl+U in nano are good enough for me, and if I need to do something more complex like actual coding, I’ll use an editor with a full GUI as well.
I know i
and :wq
and that’s all I ever plan on learning
Link to his channel? I would love to continue to watch cold take…
Edit: I think this is it
Yeah I remember using the Compiz cube on Ubuntu 8(?)
Don’t a lot of CPUs like Snapdragons already have “performance cores” and “efficiency cores” that the kernel has to be able to recognize in order to switch between them? This sounds neat but I’m just curious what’s different between these situations.
Man, Lord of Chaos is so good
Programs that want to receive or send data across the network do so using a port. A firewall (in the sense of a firewall on your computer) is basically a program that sits between the rest of your programs and your network connection and determines what programs should be allowed out to the network and what incoming connections should be allowed to talk to your programs.
This is “increasing security” by making sure you don’t let incoming connections talk to whatever happens to be running on your computer that might be listening for network traffic.
I can provide a more ELI5 explanation if you would like it.
You can drop the awkward one and just -xtract -zee -files without -verbose output
#1: CISC has gone largely (entirely?) extinct
Citation needed? Isn’t x86 considered a CISC?
This! Manufacturers were trying to lock people into their systems, just by different means. Reverse engineering a piece of low-level software (BIOS) so that you could run high-level software written for that machine architecture on different hardware was the main battle of the day.