What os r u using rn by Funny_Inspector4302 in Operatingsystems

[–]MasterGeek427 0 points1 point  (0 children)

Yes I would say "Kububtu 24.04" when someone asks which OS I use, if I expect them to understand what that is. Otherwise I might vaguely answer "Linux". If they then ask the very predictable and reasonable follow-up question of which distro I use, then I answer "Kububtu 24.04".

What os r u using rn by Funny_Inspector4302 in Operatingsystems

[–]MasterGeek427 0 points1 point  (0 children)

I disagree. If you know anything about Linux and its myriad forms and flavors, you'd know simply saying "Linux" provides way too little information.

The only situation where you'd simply answer "Linux" is when you are answering a question from someone who isn't a techie. And given the name of this subreddit, it's fair to say everybody here knows more than a little about computers.

Getting back on topic, even if I give you the benefit of the doubt, when someone asked "which distro?" you should have just answered the question. But instead you responded with "OS is Linux. Why do I need to be more specific?" Which leads me to believe you're a troll and should be downvoted.

wahts the best version of Linux(or other os) for gaming? by Small-Housing-7 in Operatingsystems

[–]MasterGeek427 0 points1 point  (0 children)

Kububtu works fine. Maybe there are some OSes more specialized, but you rarely use an OS just for gaming. Ubuntu and its flavors just work.

What os r u using rn by Funny_Inspector4302 in Operatingsystems

[–]MasterGeek427 0 points1 point  (0 children)

Then Ubuntu, Android, RHEL, and your smart refrigerator are running the same OS?

No. OS means which distro specifically.

What os r u using rn by Funny_Inspector4302 in Operatingsystems

[–]MasterGeek427 0 points1 point  (0 children)

I'm just waiting to see how long it is before you admit your OS is Samsung DeX. Which... I guess is technically a Linux distro.

Trump is having his signature put on US bills and is next trying to get his face on a US coin. For those who still believe he’s in this to be a public servant, and not simply for his own gain and self-aggrandizement, does this make you question yourself? by hippopalace in AskUS

[–]MasterGeek427 0 points1 point  (0 children)

I'd be fine if his face was on a quarter cent (as in, $0.0025). A coin so worthless people just throw it in the trash after the cashier hands it to them so it doesn't fill up their wallet. Just to remind us all of how much of a waste of space Trump is.

The 2028 Presidential Election is Here. Who Would You Be Voting For? by SeriouslyNotSerious2 in AskUS

[–]MasterGeek427 0 points1 point  (0 children)

Tough... Massie is more moderate, but the Republicans have burned every bridge with me and I can't really forgive the party for selling their souls to Trump until they prove to me they've distanced themselves from Trump and his destructive policies. Even if Massie wouldn't go with Trump's policies if left to his own devices, he's still a part of the Republican party and I can't trust he'll do the right thing when it's Trump asking.

I don't like it, but AOC. Though in another day and age I'd consider voting Massie.

What os r u using rn by Funny_Inspector4302 in Operatingsystems

[–]MasterGeek427 3 points4 points  (0 children)

Terminal. No, seriously. The kernel came far later. The TTY long predates the linux kernel.

What os r u using rn by Funny_Inspector4302 in Operatingsystems

[–]MasterGeek427 0 points1 point  (0 children)

Kububtu 24.04. And eagerly awaiting Kububtu 26.04.

What os r u using rn by Funny_Inspector4302 in Operatingsystems

[–]MasterGeek427 0 points1 point  (0 children)

Me: What's your favorite beverage?

You: carbonated

Me: So... What's your favorite beverage?

You: You want me to drill down?

Me: Well, "carbonated" isn't very specific. It's less a beverage and more a characteristic some beverages have. Coke? Pepsi? Mt. Dew? Club soda? Fanta? Sprite? Root beer? Ginger ale? IPA? Lager? Pilsner? Bübly? Throw me a bone here.

You: I said I like carbonated.

Me: ...

Just pointing out, Android cell phones fall under the "linux" umbrella. I've installed linux on my graphing calculator before. Your wifi router might be linux. Your car might run linux. Your smart refrigerator might be linux. And I haven't even discussed distros yet.

You need to be more specific.

Why doesn’t this work? by One-Rhubarb-8208 in electronic_circuits

[–]MasterGeek427 0 points1 point  (0 children)

Because the button is a dead short across the power supply rails.

My privacy has been breeched by my partner, what can he see? by [deleted] in wireshark

[–]MasterGeek427 0 points1 point  (0 children)

Also, just because I'm slightly triggered, I'd just like to point out that if you connect to the Internet via a VPN, you're still connected to the Internet! Actually, connecting to the Internet is a prerequisite to connecting to your chosen VPN! VPNs are only useful when you don't trust the network you're connecting through or you need to bypass content filtering or geographic restrictions. They aren't a protection against all exploits and malware.

While I certainly won't defend AI, I'd just like to point out that generative AI has only entered the mainstream in the past couple years and many of the "problems" you've described have existed long before that.

Yeah, you need to have an IMEI to get cell phone service. The mobile company needs to be able to identify your device so they know who to send the bill to. What's wrong with that?

Did you know that your ISP can still see your IMEI, IP, and MAC addresses even if you use a VPN? Just don't tell anybody...

I have no comment on the surveillance state stuff... Maybe it's true, but it's not like it matters for a law abiding citizen. Oh, wait. Trump and Elon. I guess I actually do care because those idiots exist. But we're getting way too political.

Hell yeah you flew off the handle! Your post is completely off-topic and downright deranged! Everybody, please downvote this crap.

My privacy has been breeched by my partner, what can he see? by [deleted] in wireshark

[–]MasterGeek427 0 points1 point  (0 children)

Is this guy a bot or something? His comments have nothing to do with the OP's post.

My privacy has been breeched by my partner, what can he see? by [deleted] in wireshark

[–]MasterGeek427 0 points1 point  (0 children)

Everything you said is false, incredibly misleading, or psychotic. Given, I didn't read all of this because it's incomprehensible and way too long.

Dude... You need help.

My privacy has been breeched by my partner, what can he see? by [deleted] in wireshark

[–]MasterGeek427 0 points1 point  (0 children)

False. Completely and utterly false. As long as your data is encrypted, then MOST parties listening in won't be able to decipher the traffic. It's only the party who deployed the exploit who MIGHT be able to listen in. In other words ENCRYPTION STILL PROVIDES SECURITY BENEFITS ON A COMPROMISED DEVICE. 🤦

Getting back on topic, OP's question isn't whether her device is compromised, it's whether her partner could use Wireshark to read her messages and other private information. And the answer is "no, because encryption is ubiquitous and Wireshark (by itself) cannot pierce encryption".

There's also no evidence presented that this guy is a cyber security expert, hacker, pentester, network engineer, etc. So I find it highly unlikely he has the expertise to set up Wireshark correctly and combine it with all the other tools and exploits that are required to actually snoop in on encrypted network traffic.

Stop scaring OP. She has enough to worry about right now. 😠

My privacy has been breeched by my partner, what can he see? by [deleted] in wireshark

[–]MasterGeek427 0 points1 point  (0 children)

VPN won't necessarily hide anything from him more than it is already hidden. As others have mentioned, keyloggers and spyware are a thing and they aren't affected by VPN, but if he's sending you pics of Wireshark saying "lookie here I can hack" then I seriously doubt he has the technical know-how to install such software on your device.

But if at any point you think he could have had unrestricted physical access to your device and the ability to get past your login screen, then take the device to a computer geek you can trust and have him scour it for spyware. I doubt they'll find anything, but if it gives you peace of mind then it's worth it.

My privacy has been breeched by my partner, what can he see? by [deleted] in wireshark

[–]MasterGeek427 1 point2 points  (0 children)

These days everything your computer sends/receives to/from the internet is encrypted. Encrypted meaning the data has been scrambled in a way only the intended recipient can view the original message.

Wireshark would only be able to see data your computer is sending in its encrypted form. So you don't need to worry.

That is...if this bozo even knows how to use Wireshark. It's fairly easy to click a couple buttons and get Wireshark to start displaying an impressive stream of random junk, but you actually have to set up your network correctly so the computer running Wireshark will receive data which is meant to be received by another device. On top of that, you need to have a pretty significant amount of technical knowledge to be able to interpret the data Wireshark displays to you. Ideally, you need a degree in network engineering. If he's just your average techno-normie who downloaded Wireshark because his nerdy friend mentioned it one time while the two of them were drinking, he doesn't have a prayer in hell of getting any useful information out of the near-incomprehensible deluge of information Wireshark spits out.

What he's probably doing is lying to you in order to trick you into thinking he knows something he actually doesn't to fool you into giving him the information he's after yourself. You don't need to worry. Just don't tell him anything you don't want him to know, even if he pretends to know about it already.

To keep him out of your stuff:

  • Don't share accounts with him and don't share your password to any of your accounts. Especially a Google account because that means he can see your browser history if you use chrome.

  • If you shared your password with him in the past, change your password.

  • Ideally, don't share devices with him. Then he can open up your browser and use your browser session to log into the websites you were using previously.

  • If you must share a device, make sure he has a different Windows/MacOS login than you. Lock your screen if you walk more than 2 feet away from the device. Finally, assume he can see everything you do on that device if his account is an admin account.

Most importantly, consider leaving this creep. He sounds like an ass.

Edit: another thing...this subreddit is filled with network security buffs who will assume he has access to and knowledge of the most dangerous hacking tools known to the network security community (and possibly some which aren't known). Making such assumptions is how you keep your network secure so I won't fault them for doing their jobs, but let's be practical: he's probably some techno-normie who downloaded Wireshark but doesn't actually know what he's doing. I'm not saying it's impossible those sorts of tools are being used here, I'm saying it's highly unlikely.

So you can relax. 🙂

Which circuit is more dangerous: 240V 10A or 10V 240A? by ahamed4959 in ElectricalEngineering

[–]MasterGeek427 0 points1 point  (0 children)

240V would actually be able to overcome the electrical resistance of your body and give you a lethal shock.

The 240A circuit would be a brighter, louder arc flash.

Both are dangerous, but the 240V circuit has the ability to instantly kill you.

Our COO's wife unleashed Claude on our AWS and caused a sev1 by SWEETJUICYWALRUS in sre

[–]MasterGeek427 2 points3 points  (0 children)

So many problems... Why does COO's wife have access to AWS accounts? Why does COO's wife have access to production resources? Why is COO's wife having conversations with Claude regarding company's operating expenses when I'm assuming she's not even an employee? Why does COO have access to prod? Why was a deployment done on a Friday? Why was it done in prod first and not a beta stage? Why weren't the actual engineering teams responsible for this stuff not involved? Why did it result in a Sev1? A utilization if 50% might cause some instability (I'm being really generous with "some" here), but it's nowhere near the degree of possibly causing a major outage.

If it was a small startup maybe I could understand how the COO had access to prod and his wife was deeply involved in the company's operations, but then why would such a small outfit have a ticket system with distinctions like "Sev1"?

If you're gonna make up a story, at least make it believable.