Literally Paradox’s entire business model…
Literally Paradox’s entire business model…
This! Manufacturers were trying to lock people into their systems, just by different means. Reverse engineering a piece of low-level software (BIOS) so that you could run high-level software written for that machine architecture on different hardware was the main battle of the day.
EAP is a wrapper for a bunch of different protocols. EAP-MSCHAPv2, EAP-TLS, etc. If you have access to the network settings on a Windows machine you may be able to get more information there.
Also, try stack exchange: https://askubuntu.com/questions/279762/how-to-connect-to-wpa2-peap-mschapv2-enterprise-wifi-networks-that-dont-use-a-c
Not gonna lie, once you’re getting past single button combos, I’m mentally checking out. Ctrl+K and Ctrl+U in nano are good enough for me, and if I need to do something more complex like actual coding, I’ll use an editor with a full GUI as well.
I know i
and :wq
and that’s all I ever plan on learning
Link to his channel? I would love to continue to watch cold take…
Edit: I think this is it
I had to downvote you to get the “total” (heart) to show up. You can see in the comment below yours that if there are only all up- or downvotes, it just shows that.
Yeah I remember using the Compiz cube on Ubuntu 8(?)
Programs that want to receive or send data across the network do so using a port. A firewall (in the sense of a firewall on your computer) is basically a program that sits between the rest of your programs and your network connection and determines what programs should be allowed out to the network and what incoming connections should be allowed to talk to your programs.
This is “increasing security” by making sure you don’t let incoming connections talk to whatever happens to be running on your computer that might be listening for network traffic.
I can provide a more ELI5 explanation if you would like it.
You can drop the awkward one and just -xtract -zee -files without -verbose output
#1: CISC has gone largely (entirely?) extinct
Citation needed? Isn’t x86 considered a CISC?
Props for finding the answer and sharing it!