• 1 Post
  • 12 Comments
Joined 1 year ago
cake
Cake day: July 8th, 2023

help-circle
  • I appreciate the interest in doing all the math, and I am also not specifically familiar with audio or the audio library, but I believe you could use a similar argument against the OG library of babel, and I happen to know(confidently believe?) that they don’t actually have a stored copy of every individual text file “in the library”, rather each page is algorithmically generated and they have proven that the algorithm will generate every possible text.

    I’d wager it’s the same thing here, they have just written the code to generate a random audio file from a unique input, and proven that for all possible audio files (within some defined constraints, like exactly 15 seconds long), there exists an input to the algorithm which will produce said audio file.

    Determining whether or not an algorithm with infrastructure backing it counts as a library is an exercise left to the reader, I suppose.









  • I usually haven’t, but I installed Clam about a month ago on my desktop, ran a full and complete scan, then left it running scheduled scans. Hasn’t found anything, and I get a lot of software from outside of my package manager, and use wine for a lot of it, so I’d say my risk/exposure is higher than most.

    I think it’s fine to go without AV on a linux desktop, but I like the peace of mind. There will definitely be more things targeting linux sytems as/if more market share is acquired, but in terms of security it’s more important that you harden the system than run an AV.




  • maengooen@lemmy.worldOPto196@lemmy.blahaj.zoneIT rule
    link
    fedilink
    English
    arrow-up
    8
    ·
    1 year ago

    A virtual local area network, or vlan, is a logically defined subset of a computer network that are used to control, from an administrator/system level, which computers are ‘connected’ to others. There can be an unbroken, physical connection between two devices, but they won’t be able to communicate because network hardware is stepping in and segregating the network.

    This is good because it can increase security- rather than having your sensitive information on your company network with a password, which can be cracked or stolen, being the only thing controlling access to it, with a vlan you can limit access to even attempt to use a password to only the parts of your network that actually require it. It also controls traffic and congestion on the network, because some data is ‘broadcast’, effectively addressed “to whom it may concern,”. A vlan places a wall around parts of the network that keeps these broadcasts inside, i.e. splits broadcast domains. Ordinarily, this would require different hardware and physical design, which can increase cost and complexity.

    But on the other hand, the physical network structure encouraged by this design is very flat, with all devices physically connected to each other. It is only inside configuration on the network hardware that things are broken up and divided, which means if whoever set it up didn’t document it, you are required to not only figure out where all the cables go, but also how the network systems are controlling the data. It’s also another “thing” that can break. If there were physical segmentation, you could follow a cable and see where its gone wrong, and if something were plugged into the wrong port, it would be plugged into the wrong device entirely, and you would just move the connection to the correct device. With a vlan, you’ll have a switch with dozens of ports, each having its own independent configuration defined on a table, which means it can be plugged into the correct device, but the wrong individual port out of dozens. The configuration could also become corrupt, or be broken by an accidental change or hardware failure, and you would now need to rebuild the table, going through each individual port and configuring which vlan was supposed to be on it.