• Microsoft’s Recall is stupid

    Recall is a Windows feature that lets you use AI to search and interact with your PC’s past. It would allow users to find and re-engage with photos, links, messages, websites, and more from a timeline of screenshots. Everything you do (aside from Private Mode in Edge-only) would be subject to these screenshots. Recall will…

  • The AI hype bubble will burst

    Let’s face it. Artificial intelligence (AI), in some form or another, is everywhere. It’s paired with devices ranging from smart scales to kitchen appliances, toothbrushes, and washing machines. If a product doesn’t have AI on the package, it’s missing out. AI is the new hotness in fall fashion. Like most hot new trends, AI is…

  • Librewolf – My favorite privacy-focused browser

    What is LibreWolf? ​LibreWolf is a free cross-platform, privacy-focused fork of Mozilla Firefox. It supports the same add-ons you enjoy using already with Firefox and comes standard with privacy enhancements to help keep you private on the modern web. Some highlights: To try out Libewolf, visit the install page. They have packages for most Linux…

  • Alternative to neofetch

    Neofetch, a rather famous system information tool has recently been archived over at GitHub. The project has seen very little development over the years, but nonetheless, it was one of the most popular ways to flex your distribution and specs across various outlets. Like many others, I searched for a replacement. I found one that…

  • Goodbye, sudo. Thanks for all the good times.

    Nothing lasts forever. Especially on the tech landscape. Recently, Systemd announced that the v256 release will introduce a replacement for the long-running tool we know as sudo. The new tool will be called “run0” Judging by the adoption rate for Systemd among most Linux distros, I imagine many will stop shipping sudo soon. You can…

  • How to Troubleshoot Common IT Issues: Tips from a Seasoned System Administrator

    The golden rule:Turn it off and then turn it back on These troubleshooting steps should help resolve many common IT issues. If the problem persists, it may be necessary to seek assistance from IT support or technical experts.

  • Secure online accounts with a physical security key

    A hardware key, also known as a hardware security key or a USB security key, is a physical device used for authentication and access control. It serves as a second authentication factor (2FA) in addition to traditional methods like passwords or biometrics. A hardware key typically takes the form of a small USB (or NFC…

  • Continuous development has ruined stability

    Continuous software development is a methodology focused on continually improving and refining software products throughout their lifecycle. It emphasizes frequent and incremental updates, allowing for rapid adaptation to changing user needs, technological advancements, and market demands. This approach involves continuous integration, where code changes are regularly integrated into the main codebase, enabling the efficient and…

  • The biggest threat to Encryption

    Encryption faces several threats in the near future, posing significant challenges to privacy, security, and individual freedoms. The most prominent threat comes from governments and law enforcement agencies advocating for backdoors or weakened encryption standards to combat crime and terrorism. However, such measures undermine the very foundation of encryption, creating vulnerabilities that could be exploited…

  • How privacy on the web is mostly a myth

    Privacy on the web is a critical concern in today’s digital age. With the vast amount of personal data being shared and collected online, individuals face constant threats to their privacy. From targeted advertising to data breaches and surveillance, internet users are increasingly vulnerable to exploitation and intrusion. Privacy is something many of us take…

  • Red Hat warns of backdoor in XZ tools used by most Linux distros

    Yesterday, Red Hat Information Risk and Security and Red Hat Product Security learned that the latest versions of the “xz” tools and libraries contain malicious code that appears to be intended to allow unauthorized access. Specifically, this code is present in versions 5.6.0 and 5.6.1 of the libraries. Fedora Linux 40 users may have received version 5.6.0, depending on…

  • Easy-to-use make-me-root exploit lands for recent Linux kernels

    A Linux privilege-escalation proof-of-concept exploit has been published that, according to the bug hunter who developed it, typically works effortlessly on kernel versions between at least 5.14 and 6.6.14.  Running the exploit as a normal user on a vulnerable machine will grant you root access to the box, allowing you to do whatever you want…

  • AT&T confirms data for 73 million customers leaked on hacker forum

    AT&T has finally confirmed it is impacted by a data breach affecting 73 million current and former customers after initially denying the leaked data originated from them. This comes after AT&T has repeatedly denied for the past two weeks that a massive trove of leaked customer data originated from them and or that their systems had been…

irritated.dev