• 1 Post
  • 78 Comments
Joined 3 months ago
cake
Cake day: June 23rd, 2024

help-circle


  • Trojan is any malware that pretends to be a legit program. It does not need to have backdoor or info stealing capability even though most malware (trojan or not) today does. For example, pre-Internet trojans might just invisibly install themselves along the actual program they were bundled with and then nuke the system on a certain date. Antivirus companies would even advance the date on their systems in hopes of detecting these and being the first to develop a patch.

    But since this program is not malicious, it just straight up hogs system resources and/or crashes it due to a mistake, it cannot be considered malware and therefore not a trojan.

    Certain Intel processors from around 2000 would crash everything when loading the 4 bytes F0 0F C7 C8 into a specific register. Would you consider this a backdoor because it allows any program to crash the system? I wouldn’t say so, crashing Windows 98 was probably not too hard anyway…





  • It was advertised as “2 TB (64 GB Extended)” at a local clearance sale (not AliExpress), which was basically correct though I would prefer “64 GB but misprogrammed so everything can get corrupted at any time”. When buying it, I didn’t yet know if I could reprogram the chip but the low price was justified for the pretty aluminum case with a USB-C port and place for a custom PCB. I decided to buy it also to prevent another, less technical person from using it and losing their data. The store was getting rid of inventory for very cheap and would close soon so no more fake drives would be ordered.



  • Sometimes, counterfeits or unknown brands are so similar to the real deal that it barely matters. I’d say that basic electronics (alarm clocks, kitchen scales, calculators, SD security cams) or even RAM is fine. With appropriate expectations, parts like video or USB cables, hubs etc., small home improvement items (hooks, screws) are fine too. Avoid categories where a lot of items have fake specs (storage devices, LED bulbs, anything that claims a runtime on a Li-Ion battery). Power electronics (especially if using mains or non-tiny Li-Ion batteries) can be downright dangerous. For novelty items and electronics modules, it’s usually easy to find text or video reviews on other websites because they’re easy to uniquely describe. Remember to consider ways in which the product can be utter crap despite high reviews citing good first impressions; it also helps to have practical knowledge of testing the properties of the items and fixing common issues.





  • Input devices almost never use USB 3.0. In fact, most manufacturers save money and don’t shield the cable, forcing half-speed USB 1.1, which is enough for all mice and keyboards - less than 50 kb/s of the available 6 Mb/s is required even for 240Hz polling. High-end mice might have USB 3.0 (9 pins instead of 4 in the plug) but there should be no practical difference between 3.0 and 2.0 speeds. The polling rate will most likely be identical and the microsecond difference between how long each takes to transfer the data is likely way lower than lag from the mouse’s wireless connection.

    Just use any USB 2.0 hub, even $2 ones from AliExpress will work the same as high-end ones. Most are sold with 4 ports because that’s what their standard generic chip does. You probably have one lying around or built into the monitor. You’re unlikely to cause interference so just choose any spot with strong signal to the desk area, not necessarily line-of-sight: if the mouse works everywhere within 2 meters from the intended area, then the intended area will have good signal and minimal chance of dropout. The lag or polling rate does not decrease with signal strength unless you count extra nanoseconds the radio waves need to travel.

    The only difference is when you need another port for high-speed applications such as mass storage devices or MTP with your phone, at which point just plug them directly into the PC for max speed.








  • ChaoticNeutralCzech@feddit.orgtoFediverse@lemmy.mlA symbol for the ⁂ fediverse
    link
    fedilink
    English
    arrow-up
    31
    arrow-down
    3
    ·
    edit-2
    25 days ago

    Note that if supported by the font you use, the three symbols will usually be drawn the same way as an asterisk (*) in that font. This means a lot of variation.

    Your browser’s rendering: */⁂

    Several typefaces’ rendering of Unicode U+2042 ASTERISM:

    I think the diversity is alright! It’s like the Fediverse: instances follow a standard to work with each other but can be heavily customized without breaking integration.