#accessing remote computer
Explore tagged Tumblr posts
Text
Autoenshittification

Forget F1: the only car race that matters now is the race to turn your car into a digital extraction machine, a high-speed inkjet printer on wheels, stealing your private data as it picks your pocket. Your car’s digital infrastructure is a costly, dangerous nightmare — but for automakers in pursuit of postcapitalist utopia, it’s a dream they can’t give up on.
Your car is stuffed full of microchips, a fact the world came to appreciate after the pandemic struck and auto production ground to a halt due to chip shortages. Of course, that wasn’t the whole story: when the pandemic started, the automakers panicked and canceled their chip orders, only to immediately regret that decision and place new orders.
But it was too late: semiconductor production had taken a serious body-blow, and when Big Car placed its new chip orders, it went to the back of a long, slow-moving line. It was a catastrophic bungle: microchips are so integral to car production that a car is basically a computer network on wheels that you stick your fragile human body into and pray.
The car manufacturers got so desperate for chips that they started buying up washing machines for the microchips in them, extracting the chips and discarding the washing machines like some absurdo-dystopian cyberpunk walnut-shelling machine:
https://www.autoevolution.com/news/desperate-times-companies-buy-washing-machines-just-to-rip-out-the-chips-187033.html
These digital systems are a huge problem for the car companies. They are the underlying cause of a precipitous decline in car quality. From touch-based digital door-locks to networked sensors and cameras, every digital system in your car is a source of endless repair nightmares, costly recalls and cybersecurity vulnerabilities:
https://www.reuters.com/business/autos-transportation/quality-new-vehicles-us-declining-more-tech-use-study-shows-2023-06-22/
What’s more, drivers hate all the digital bullshit, from the janky touchscreens to the shitty, wildly insecure apps. Digital systems are drivers’ most significant point of dissatisfaction with the automakers’ products:
https://www.theverge.com/23801545/car-infotainment-customer-satisifaction-survey-jd-power
Even the automakers sorta-kinda admit that this is a problem. Back in 2020 when Massachusetts was having a Right-to-Repair ballot initiative, Big Car ran these unfuckingbelievable scare ads that basically said, “Your car spies on you so comprehensively that giving anyone else access to its systems will let murderers stalk you to your home and kill you:
https://pluralistic.net/2020/09/03/rip-david-graeber/#rolling-surveillance-platforms
But even amid all the complaining about cars getting stuck in the Internet of Shit, there’s still not much discussion of why the car-makers are making their products less attractive, less reliable, less safe, and less resilient by stuffing them full of microchips. Are car execs just the latest generation of rubes who’ve been suckered by Silicon Valley bullshit and convinced that apps are a magic path to profitability?
Nope. Car execs are sophisticated businesspeople, and they’re surfing capitalism’s latest — and last — hot trend: dismantling capitalism itself.
Now, leftists have been predicting the death of capitalism since The Communist Manifesto, but even Marx and Engels warned us not to get too frisky: capitalism, they wrote, is endlessly creative, constantly reinventing itself, re-emerging from each crisis in a new form that is perfectly adapted to the post-crisis reality:
https://www.nytimes.com/2022/10/31/books/review/a-spectre-haunting-china-mieville.html
But capitalism has finally run out of gas. In his forthcoming book, Techno Feudalism: What Killed Capitalism, Yanis Varoufakis proposes that capitalism has died — but it wasn’t replaced by socialism. Rather, capitalism has given way to feudalism:
https://www.penguin.co.uk/books/451795/technofeudalism-by-varoufakis-yanis/9781847927279
Under capitalism, capital is the prime mover. The people who own and mobilize capital — the capitalists — organize the economy and take the lion’s share of its returns. But it wasn’t always this way: for hundreds of years, European civilization was dominated by rents, not markets.
A “rent” is income that you get from owning something that other people need to produce value. Think of renting out a house you own: not only do you get paid when someone pays you to live there, you also get the benefit of rising property values, which are the result of the work that all the other homeowners, business owners, and residents do to make the neighborhood more valuable.
The first capitalists hated rent. They wanted to replace the “passive income” that landowners got from taxing their serfs’ harvest with active income from enclosing those lands and grazing sheep in order to get wool to feed to the new textile mills. They wanted active income — and lots of it.
Capitalist philosophers railed against rent. The ���free market” of Adam Smith wasn’t a market that was free from regulation — it was a market free from rents. The reason Smith railed against monopolists is because he (correctly) understood that once a monopoly emerged, it would become a chokepoint through which a rentier could cream off the profits he considered the capitalist’s due:
https://locusmag.com/2021/03/cory-doctorow-free-markets/
Today, we live in a rentier’s paradise. People don’t aspire to create value — they aspire to capture it. In Survival of the Richest, Doug Rushkoff calls this “going meta”: don’t provide a service, just figure out a way to interpose yourself between the provider and the customer:
https://pluralistic.net/2022/09/13/collapse-porn/#collapse-porn
Don’t drive a cab, create Uber and extract value from every driver and rider. Better still: don’t found Uber, invest in Uber options and extract value from the people who invest in Uber. Even better, invest in derivatives of Uber options and extract value from people extracting value from people investing in Uber, who extract value from drivers and riders. Go meta.
This is your brain on the four-hour-work-week, passive income mind-virus. In Techno Feudalism, Varoufakis deftly describes how the new “Cloud Capital” has created a new generation of rentiers, and how they have become the richest, most powerful people in human history.
Shopping at Amazon is like visiting a bustling city center full of stores — but each of those stores’ owners has to pay the majority of every sale to a feudal landlord, Emperor Jeff Bezos, who also decides which goods they can sell and where they must appear on the shelves. Amazon is full of capitalists, but it is not a capitalist enterprise. It’s a feudal one:
https://pluralistic.net/2022/11/28/enshittification/#relentless-payola
This is the reason that automakers are willing to enshittify their products so comprehensively: they were one of the first industries to decouple rents from profits. Recall that the reason that Big Car needed billions in bailouts in 2008 is that they’d reinvented themselves as loan-sharks who incidentally made cars, lending money to car-buyers and then “securitizing” the loans so they could be traded in the capital markets.
Even though this strategy brought the car companies to the brink of ruin, it paid off in the long run. The car makers got billions in public money, paid their execs massive bonuses, gave billions to shareholders in buybacks and dividends, smashed their unions, fucked their pensioned workers, and shipped jobs anywhere they could pollute and murder their workforce with impunity.
Car companies are on the forefront of postcapitalism, and they understand that digital is the key to rent-extraction. Remember when BMW announced that it was going to rent you the seatwarmer in your own fucking car?
https://pluralistic.net/2020/07/02/big-river/#beemers
Not to be outdone, Mercedes announced that they were going to rent you your car’s accelerator pedal, charging an extra $1200/year to unlock a fully functional acceleration curve:
https://www.theverge.com/2022/11/23/23474969/mercedes-car-subscription-faster-acceleration-feature-price
This is the urinary tract infection business model: without digitization, all your car’s value flowed in a healthy stream. But once the car-makers add semiconductors, each one of those features comes out in a painful, burning dribble, with every button on that fakakta touchscreen wired directly into your credit-card.
But it’s just for starters. Computers are malleable. The only computer we know how to make is the Turing Complete Von Neumann Machine, which can run every program we know how to write. Once they add networked computers to your car, the Car Lords can endlessly twiddle the knobs on the back end, finding new ways to extract value from you:
https://doctorow.medium.com/twiddler-1b5c9690cce6
That means that your car can track your every movement, and sell your location data to anyone and everyone, from marketers to bounty-hunters looking to collect fees for tracking down people who travel out of state for abortions to cops to foreign spies:
https://www.vice.com/en/article/n7enex/tool-shows-if-car-selling-data-privacy4cars-vehicle-privacy-report
Digitization supercharges financialization. It lets car-makers offer subprime auto-loans to desperate, poor people and then killswitch their cars if they miss a payment:
https://www.youtube.com/watch?v=4U2eDJnwz_s
Subprime lending for cars would be a terrible business without computers, but digitization makes it a great source of feudal rents. Car dealers can originate loans to people with teaser rates that quickly blow up into payments the dealer knows their customer can’t afford. Then they repo the car and sell it to another desperate person, and another, and another:
https://pluralistic.net/2022/07/27/boricua/#looking-for-the-joke-with-a-microscope
Digitization also opens up more exotic options. Some subprime cars have secondary control systems wired into their entertainment system: miss a payment and your car radio flips to full volume and bellows an unstoppable, unmutable stream of threats. Tesla does one better: your car will lock and immobilize itself, then blare its horn and back out of its parking spot when the repo man arrives:
https://tiremeetsroad.com/2021/03/18/tesla-allegedly-remotely-unlocks-model-3-owners-car-uses-smart-summon-to-help-repo-agent/
Digital feudalism hasn’t stopped innovating — it’s just stopped innovating good things. The digital device is an endless source of sadistic novelties, like the cellphones that disable your most-used app the first day you’re late on a payment, then work their way down the other apps you rely on for every day you’re late:
https://restofworld.org/2021/loans-that-hijack-your-phone-are-coming-to-india/
Usurers have always relied on this kind of imaginative intimidation. The loan-shark’s arm-breaker knows you’re never going to get off the hook; his goal is in intimidating you into paying his boss first, liquidating your house and your kid’s college fund and your wedding ring before you default and he throws you off a building.
Thanks to the malleability of computerized systems, digital arm-breakers have an endless array of options they can deploy to motivate you into paying them first, no matter what it costs you:
https://pluralistic.net/2021/04/02/innovation-unlocks-markets/#digital-arm-breakers
Car-makers are trailblazers in imaginative rent-extraction. Take VIN-locking: this is the practice of adding cheap microchips to engine components that communicate with the car’s overall network. After a new part is installed in your car, your car’s computer does a complex cryptographic handshake with the part that requires an unlock code provided by an authorized technician. If the code isn’t entered, the car refuses to use that part.
VIN-locking has exploded in popularity. It’s in your iPhone, preventing you from using refurb or third-party replacement parts:
https://doctorow.medium.com/apples-cement-overshoes-329856288d13
It’s in fuckin’ ventilators, which was a nightmare during lockdown as hospital techs nursed their precious ventilators along by swapping parts from dead systems into serviceable ones:
https://www.vice.com/en/article/3azv9b/why-repair-techs-are-hacking-ventilators-with-diy-dongles-from-poland
And of course, it’s in tractors, along with other forms of remote killswitch. Remember that feelgood story about John Deere bricking the looted Ukrainian tractors whose snitch-chips showed they’d been relocated to Russia?
https://doctorow.medium.com/about-those-kill-switched-ukrainian-tractors-bc93f471b9c8
That wasn’t a happy story — it was a cautionary tale. After all, John Deere now controls the majority of the world’s agricultural future, and they’ve boobytrapped those ubiquitous tractors with killswitches that can be activated by anyone who hacks, takes over, or suborns Deere or its dealerships.
Control over repair isn’t limited to gouging customers on parts and service. When a company gets to decide whether your device can be fixed, it can fuck you over in all kinds of ways. Back in 2019, Tim Apple told his shareholders to expect lower revenues because people were opting to fix their phones rather than replace them:
https://www.apple.com/newsroom/2019/01/letter-from-tim-cook-to-apple-investors/
By usurping your right to decide who fixes your phone, Apple gets to decide whether you can fix it, or whether you must replace it. Problem solved — and not just for Apple, but for car makers, tractor makers, ventilator makers and more. Apple leads on this, even ahead of Big Car, pioneering a “recycling” program that sees trade-in phones shredded so they can’t possibly be diverted from an e-waste dump and mined for parts:
https://www.vice.com/en/article/yp73jw/apple-recycling-iphones-macbooks
John Deere isn’t sleeping on this. They’ve come up with a valuable treasure they extract when they win the Right-to-Repair: Deere singles out farmers who complain about its policies and refuses to repair their tractors, stranding them with six-figure, two-ton paperweight:
https://pluralistic.net/2022/05/31/dealers-choice/#be-a-shame-if-something-were-to-happen-to-it
The repair wars are just a skirmish in a vast, invisible fight that’s been waged for decades: the War On General-Purpose Computing, where tech companies use the law to make it illegal for you to reconfigure your devices so they serve you, rather than their shareholders:
https://memex.craphound.com/2012/01/10/lockdown-the-coming-war-on-general-purpose-computing/
The force behind this army is vast and grows larger every day. General purpose computers are antithetical to technofeudalism — all the rents extracted by technofeudalists would go away if others (tinkereres, co-ops, even capitalists!) were allowed to reconfigure our devices so they serve us.
You’ve probably noticed the skirmishes with inkjet printer makers, who can only force you to buy their ink at 20,000% markups if they can stop you from deciding how your printer is configured:
https://pluralistic.net/2022/08/07/inky-wretches/#epson-salty But we’re also fighting against insulin pump makers, who want to turn people with diabetes into walking inkjet printers:
https://pluralistic.net/2022/06/10/loopers/#hp-ification
And companies that make powered wheelchairs:
https://pluralistic.net/2022/06/08/chair-ish/#r2r
These companies start with people who have the least agency and social power and wreck their lives, then work their way up the privilege gradient, coming for everyone else. It’s called the “shitty technology adoption curve”:
https://pluralistic.net/2022/08/21/great-taylors-ghost/#solidarity-or-bust
Technofeudalism is the public-private-partnership from hell, emerging from a combination of state and private action. On the one hand, bailing out bankers and big business (rather than workers) after the 2008 crash and the covid lockdown decoupled income from profits. Companies spent billions more than they earned were still wildly profitable, thanks to those public funds.
But there’s also a policy dimension here. Some of those rentiers’ billions were mobilized to both deconstruct antitrust law (allowing bigger and bigger companies and cartels) and to expand “IP” law, turning “IP” into a toolsuite for controlling the conduct of a firm’s competitors, critics and customers:
https://locusmag.com/2020/09/cory-doctorow-ip/
IP is key to understanding the rise of technofeudalism. The same malleability that allows companies to “twiddle” the knobs on their services and keep us on the hook as they reel us in would hypothetically allow us to countertwiddle, seizing the means of computation:
https://pluralistic.net/2023/04/12/algorithmic-wage-discrimination/#fishers-of-men
The thing that stands between you and an alternative app store, an interoperable social media network that you can escape to while continuing to message the friends you left behind, or a car that anyone can fix or unlock features for is IP, not technology. Under capitalism, that technology would already exist, because capitalists have no loyalty to one another and view each other’s margins as their own opportunities.
But under technofeudalism, control comes from rents (owning things), not profits (selling things). The capitalist who wants to participate in your iPhone’s “ecosystem” has to make apps and submit them to Apple, along with 30% of their lifetime revenues — they don’t get to sell you jailbreaking kit that lets you choose their app store.
Rent-seeking technology has a holy grail: control over “ring zero” — the ability to compel you to configure your computer to a feudalist’s specifications, and to verify that you haven’t altered your computer after it came into your possession:
https://pluralistic.net/2022/01/30/ring-minus-one/#drm-political-economy
For more than two decades, various would-be feudal lords and their court sorcerers have been pitching ways of doing this, of varying degrees of outlandishness.
At core, here’s what they envision: inside your computer, they will nest another computer, one that is designed to run a very simple set of programs, none of which can be altered once it leaves the factory. This computer — either a whole separate chip called a “Trusted Platform Module” or a region of your main processor called a secure enclave — can tally observations about your computer: which operating system, modules and programs it’s running.
Then it can cryptographically “sign” these observations, proving that they were made by a secure chip and not by something you could have modified. Then you can send this signed “attestation” to someone else, who can use it to determine how your computer is configured and thus whether to trust it. This is called “remote attestation.”
There are some cool things you can do with remote attestation: for example, two strangers playing a networked video game together can use attestations to make sure neither is running any cheat modules. Or you could require your cloud computing provider to use attestations that they aren’t stealing your data from the server you’re renting. Or if you suspect that your computer has been infected with malware, you can connect to someone else and send them an attestation that they can use to figure out whether you should trust it.
Today, there’s a cool remote attestation technology called “PrivacyPass” that replaces CAPTCHAs by having you prove to your own device that you are a human. When a server wants to make sure you’re a person, it sends a random number to your device, which signs that number along with its promise that it is acting on behalf of a human being, and sends it back. CAPTCHAs are all kinds of bad — bad for accessibility and privacy — and this is really great.
But the billions that have been thrown at remote attestation over the decades is only incidentally about solving CAPTCHAs or verifying your cloud server. The holy grail here is being able to make sure that you’re not running an ad-blocker. It’s being able to remotely verify that you haven’t disabled the bossware your employer requires. It’s the power to block someone from opening an Office365 doc with LibreOffice. It’s your boss’s ability to ensure that you haven’t modified your messaging client to disable disappearing messages before he sends you an auto-destructing memo ordering you to break the law.
And there’s a new remote attestation technology making the rounds: Google’s Web Environment Integrity, which will leverage Google’s dominance over browsers to allow websites to block users who run ad-blockers:
https://github.com/RupertBenWiser/Web-Environment-Integrity
There’s plenty else WEI can do (it would make detecting ad-fraud much easier), but for every legitimate use, there are a hundred ways this could be abused. It’s a technology purpose-built to allow rent extraction by stripping us of our right to technological self-determination.
Releasing a technology like this into a world where companies are willing to make their products less reliable, less attractive, less safe and less resilient in pursuit of rents is incredibly reckless and shortsighted. You want unauthorized bread? This is how you get Unauthorized Bread:
https://arstechnica.com/gaming/2020/01/unauthorized-bread-a-near-future-tale-of-refugees-and-sinister-iot-appliances/amp/
If you'd like an essay-formatted version of this thread to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2023/07/24/rent-to-pwn/#kitt-is-a-demon
[Image ID: The interior of a luxury car. There is a dagger protruding from the steering wheel. The entertainment console has been replaced by the text 'You wouldn't download a car,' in MPAA scare-ad font. Outside of the windscreen looms the Matrix waterfall effect. Visible in the rear- and side-view mirror is the driver: the figure from Munch's 'Scream.' The screen behind the steering-wheel has been replaced by the menacing red eye of HAL9000 from Stanley Kubrick's '2001: A Space Odyssey.']
Image: Cryteria (modified) https://commons.wikimedia.org/wiki/File:HAL9000.svg
CC BY 3.0 https://creativecommons.org/licenses/by/3.0/deed.en
#pluralistic#shitty technology adoption curve#unauthorized bread#automotive#arm-breakers#cars#big car#right to repair#rent-seeking#digital feudalism#neofeudalism#drm#wei#remote attestation#private access tokens#yannis varoufakis#web environment integrity#paternalism#war on general purpose computing#competitive compatibility#google#enshittification#interoperability#adversarial interoperability#comcom#the internet con#postcapitalism#ring zero#care#med-tech
4K notes
·
View notes
Text
because i Must be working on a minimum of 50 things at once or I'll explode, i think im gonna get around to setting up a pihole for my network soon and then make this old server i snagged from work into a NAS cause ive got ample big storage drives to throw in it :3c
#crow.txt#i think i have at Least one RAIDable pair? mayyyyybe 2#i think i also have one 8tb drive. i think one of the pairs i have are 4tb each?#i think i have roughly 5 spare loose fuckin hard drives. just like. around. ive accumulated#theyre in perfectly good condition and made for servers anyway. which is why ive held onto them#ive just been waiting for a) a computer to make into a nas and b) time to go about setting that up#and luck would have it i got a pretty decent old xeon machine a month ago for free. sooooooo..#now the biggest effort is to slap some drives in and find somewhere to park it forever#...man i could maybe just do the pihole FROM the server? but i dont think itd run off truenas. nvm#i can genuinely just put the big black box somewhere and put the raspberry pi on top of it. and then never touch it lmao#remote access either when needed. and otherwise leave it be
9 notes
·
View notes
Note
For either adopted Donnie or adopted Mikey 

Angie's excited : )
THank you!
#asks#tmnt#rottmnt#adopted au#my doodles#i sent it to Angie b/c Dee is not allowed in disney#he remotely hacked all the rides once and made the entire place shut down#for two weeks#disney never figured out who did it#but his pops and uncle do not trust what that child would do if given direct access to the place#(though in his defense he was sick at the time he hacked it)#(by then they should have known not to give him unmonitored access to computers when he's sick)#(stuff like this always happens when they do)
69 notes
·
View notes
Text
i keep having horrific dreams about getting computer viruses and being sosososo scared but if any of that shit happened in real life it would just be like. Lol time to reinstall windows
#cant catch me gay thoughts#i took a nap earlier and had a dream where me and a friend i do not really talk to any more both got the same remote access trojan#and the threat actor was like poking at us at the same time so i called them on discord and we were both screaming sobbing#as this guy fucked with our computers and like typed shit out on notepad and was like OOOO IM GONNA EXPOSE YOU!!!#very unserious shit if it happened in real
2 notes
·
View notes
Text
How to check if your computer is being monitored
In today's digital age, the issue of privacy and security is more pressing than ever. Whether you’re a casual user or a professional, understanding if your computer is being monitored is crucial. This guide will delve into the signs of monitoring, tools to detect it, and steps to safeguard your privacy.

Understanding Computer Monitoring
Before diving into the signs and detection methods, it’s essential to understand what computer monitoring entails. Monitoring can involve tracking your online activity, keystrokes, file access, and even webcam usage. This can be done by malicious software (malware), spyware, or legitimate monitoring software used by employers or parents.
Types of Monitoring
Malware and Spyware: These are malicious programs that can be installed without your knowledge. They can track your activities and send data back to an attacker.
Keyloggers: This type of software records keystrokes, capturing sensitive information like passwords and personal messages.
Remote Access Tools (RATs): These tools allow someone to control your computer remotely, monitoring your screen, accessing files, and even using your webcam.
Legitimate Monitoring Software: Often used in corporate environments, this software tracks employee activity for productivity or compliance reasons. While legal, it can still infringe on personal privacy.
Signs That Your Computer May Be Monitored
Recognizing the signs that your computer might be monitored is the first step in protecting yourself.
1. Unusual System Behavior
Slow Performance: If your computer suddenly becomes sluggish, it might be due to monitoring software consuming resources.
Frequent Crashes or Freezes: Unexpected system crashes can indicate underlying issues, including malware.
2. Suspicious Programs
Unknown Applications: Check your installed programs for any unfamiliar applications. Many monitoring tools disguise themselves as legitimate software.
High Resource Usage: Use the Task Manager (Windows) or Activity Monitor (Mac) to look for processes consuming excessive CPU or memory.
3. Network Activity
Unexplained Network Traffic: Use network monitoring tools to check for unusual data being sent or received. High outbound traffic could indicate that data is being transmitted without your consent.
Blocked Ports: Monitoring software often uses specific ports to communicate. If you notice blocked ports that you didn’t configure, it could be a red flag.
4. Webcam and Microphone Behavior
Indicator Light Activation: If your webcam or microphone is being accessed without your knowledge, the indicator light may be on even when you're not using it.
Unexpected Recordings: Check for unusual files that could be recordings made by your microphone or webcam.
5. Browser Behavior
Unusual Browser Extensions: Check for extensions you didn’t install. Some can track your browsing activity.
Unexpected Redirects: Frequent redirects to strange sites or altered search results can indicate tracking.
6. Security Alerts
Antivirus Notifications: If your antivirus software frequently alerts you about threats, it may indicate that monitoring software is present.
Firewall Alerts: Unusual outgoing connection attempts can suggest that an unauthorized program is trying to access the internet.
Tools to Detect Monitoring Software
If you suspect that your computer is being monitored, several tools can help you investigate further.
1. Antivirus and Anti-Malware Software
Using a reliable antivirus or anti-malware program can help detect and remove malicious software. Some popular options include:
Malwarebytes: Excellent for detecting and removing malware and spyware.
Norton: Offers comprehensive protection against various types of threats.
2. Network Monitoring Tools
Tools like Wireshark can help analyze network traffic and identify suspicious activity. You can monitor data packets to see if there are any unexpected connections.
3. Task Manager / Activity Monitor
Regularly check the Task Manager (Windows) or Activity Monitor (Mac) for processes that look unfamiliar or suspicious. Research any questionable applications before taking action.
4. System Scans
Use built-in tools to perform system scans:
Windows Defender: Run a full scan for malware and spyware.
Mac’s Built-in Security Features: Use the Malware Removal Tool for additional scanning.
5. Firewall Monitoring
Make sure your firewall is active and monitor logs for any unusual activity. A firewall can block unauthorized access attempts and alert you to potential threats.
Steps to Protect Your Privacy
If you determine that your computer is being monitored or you want to prevent it from happening, follow these steps to enhance your security.
1. Update Your Software Regularly
Keeping your operating system and all software up-to-date ensures that you have the latest security patches. This reduces vulnerabilities that can be exploited by monitoring tools.
2. Use Strong Passwords
Implement strong, unique passwords for all your accounts and devices. Consider using a password manager to generate and store complex passwords securely.
3. Enable Two-Factor Authentication
Two-factor authentication (2FA) adds an extra layer of security by requiring a second form of verification, making unauthorized access much more difficult.
4. Install a Firewall
Ensure you have a firewall activated, whether it’s built-in (like Windows Firewall) or third-party. This helps control incoming and outgoing network traffic.
5. Be Cautious with Downloads
Avoid downloading software from untrusted sources, as this can introduce malware to your system. Always verify the legitimacy of software before installing it.
6. Regularly Review Permissions
Check application permissions on your device regularly. Revoke access for any apps that do not need to access your camera, microphone, or location.
7. Use a VPN
A Virtual Private Network (VPN) encrypts your internet connection, making it difficult for anyone to monitor your online activities.
8. Educate Yourself
Stay informed about the latest cybersecurity threats and best practices. Knowledge is your best defense against monitoring.
When to Seek Professional Help
If you suspect your computer is being monitored and cannot identify or remove the software yourself, consider seeking professional help. Cybersecurity experts can perform a thorough analysis of your system and provide tailored solutions.
Conclusion
Understanding if your computer is being monitored is vital for protecting your privacy. By recognizing the signs, utilizing detection tools, and implementing security measures, you can safeguard your personal information. Remember, vigilance is key in the ever-evolving landscape of digital security. Stay informed, proactive, and secure in your online presence.
#Computer Security#Online Privacy#Cybersecurity#Monitoring Software#Malware Detection#Privacy Protection#Digital Security#Keyloggers#Network Monitoring#Antivirus#VPN#Internet Safety#Personal Data Security#Remote Access Tools#Digital Awareness
2 notes
·
View notes
Text
⌖ In OTHER NEWS, fellow V*xtuber SCAMBAITER’S REVENGE got into some COUYON SCAMMER’S computer and made the scammer’s V*xtube account SUBSCRIBE TO MY CHANNEL -- before NUKING his entire operating system! A LEGEND! SIR! You have WHAT’S LEFT OF MY HEART!
#⌖ online#// Al Radiodemon on her scambaiting arc rn... she does wacky improv to waste their time and make them unsuspecting participants in#keeping her bored ass entertained. Like a Kitboga type scambaiter.#'gets two scammers in a rap battle/goose honking contest by pretending to be a senile old lady' type clown.#Scambaiter's Revenge is not a real channel but it is in her universe. He's the one who got into a scam center's phone system when she was#livestream baiting that scam center on April 1st bc he's a fan of hers and wanted to catch her incoming call.#(This happens in real life sometimes if the call center's software is computerbased like zoom or skype-based! Scambaiters do get access!)#He's the type of scambaiter who pretends to be a legit caller/victim and lets them get into his (fake) computer with remote access software#and then reverses the connection into scammers' computers and wreaks havoc (steals their files & deploys viruses that destroy the computer)#Like a ScammerRevolts or Scambaiter (that's the channel name) or Deeveeaar type scambaiter.#Anyway... he did get into a scammer's computer and did his thing and went on the scammer's v*xtube and subscribed him to a) himself and#b) Al Radiodemon and that's the funniest thing in the world to Al. That's so iconic. (And then he deployed the memz virus and nuked the PC.)#I think they should collab. I think she should do the wacky improv to distract scammers while he obliterates their computers.
2 notes
·
View notes
Text
well you, see a RAT controls your computer form inside!
and a mouse form the outside
6K notes
·
View notes
Text
I haven't been away on a trip since June so all my packing lists are on my old phone :((( can't wait to get there and find out I only packed four pairs of underwear for a week's trip instead of the usual forty three
#it's been too long since I've gone somewhere#have slept in the same bed since mid June wtf grow up#embarrassing#how have i not been away anywhere????#what about all the phone calls with Sophia where i wanted to run to the airport and catch a flight into the sun and#oh yeah i bet she's rung brad and asked him to set up a computer in the hotel room#with a webcam and remote access to work and#install teams#i can't escape her#Torquay isn't far enough#she's got Brad checking in on me every day#brad reports directly to her
0 notes
Text
1 note
·
View note
Text
REMOTE ACCESS TRIGGERS
TINY CIRCUIT TRANSPORTER BRIDGES
#UNNECESSARY COMPUTER FUNCTIONALITY#REMOTE ACCESS TRIGGERS#TINY CIRCUIT TRANSPORTER BRIDGES#BRIDGE#BRIDGES
0 notes
Text
I feel awkward about pointing this out, but uh, technology is VERY DIFFERENT in urban and rural areas. Saying "by 1920 no one has horses" is incorrect. In rural areas of North america, many people used horses as their main mode of transport up into the 1950s. My great aunt (born.. 1925 I think? Around there) rode in a horse-pulled school wagon to a one room school house in the 1930s (speaking of those: My mum went to a one room school house until 1966). And that was average for most of rural Canada at that time for kids who had access to school.
People in rural areas of NA used candles as their main form of lighting into the 1930s.
we were the liminal kids. alive before the internet, just long enough we remember when things really were different.
when i work in preschools, the hand signal kids make for phone is a flat palm, their fingers like brackets. i still make the pinky-and-thumb octave stretch when i "pick up" to respond to them.
the symbol to save a file is a floppy disc. the other day while cleaning out my parents' house, i found a collection of over a hundred CDs, my mom's handwriting on each of them. first day of kindergarten. playlist for beach trip '94. i don't have a device that can play any of these anymore - none of my electronics are compatible. there are pieces of my childhood buried under these, and i cannot access them. but they do exist, which feels special.
my siblings and i recently spent hours digitizing our family's photos as a present for my mom's birthday. there's a year where the pictures just. stop. cameras on phones got to be too good. it didn't make sense to keep getting them developed. and there are a quite a few years that are lost to us. when we were younger, mementos were lost to floods. and again, while i was in middle school, google drive wasn't "a thing". somewhere out there, there are lost memories on dead laptops. which is to say - i lost it to the flood twice, kind of.
when i teach undergrad, i always feel kind of slapped-in-the-face. they're over 18, and they don't remember a classroom without laptops. i remember when my school put in the first smartboard, and how it was a huge privilege. i used the word walkman once, and had to explain myself. we are only separated by a decade. it feels like we are separated by so much more than that.
and something about ... being half-in half-out of the world after. it marks you. i don't know why. but "real adults" see us as lost children, even though many of us are old enough to have a mortgage. my little sister grew up with more access to the internet than i did - and she's only got 4 years of difference. i know how to write cursive, and i actually think it's good practice for kids to learn too - it helps their motor development. but i also know they have to be able to touch-type way faster than was ever required from me.
in between, i guess. i still like to hand-write most things, even though typing is way faster and more accessible for me. i still wear a pj shirt from when i was like 18. i don't really understand how to operate my parents' smart tv. the other day when i got seriously injured, i used hey siri to call my brother. but if you asked me - honestly, i prefer calling to texting. a life in anachronisms. in being a little out-of-phase. never quite in synchronicity.
#theres actually a huuuge issue with people forgetting about tech in rural areas#'just use zoom' my brother in hell my uncle is barely rural (20 mins away from the nearest small town) and he cant do zoom calls#unless theyre on his phone and he uses data. he could not ever work remotely.#many people dont have access to fast internet#im not saying the ppl in this thread are at fault im saying systemically theres an issue with ppl assuming everyone had 4g or 5g access#hows that kid supposed to download the DLC second have to that game? haul his entire computer into town?
51K notes
·
View notes
Text
#callie.txt.exe#robotgirl#polls#(pointing a gun at you) do you want the utility or do you want the fun
7K notes
·
View notes
Text
Tech Breakdown: What Is a SuperNIC? Get the Inside Scoop!

The most recent development in the rapidly evolving digital realm is generative AI. A relatively new phrase, SuperNIC, is one of the revolutionary inventions that makes it feasible.
Describe a SuperNIC
On order to accelerate hyperscale AI workloads on Ethernet-based clouds, a new family of network accelerators called SuperNIC was created. With remote direct memory access (RDMA) over converged Ethernet (RoCE) technology, it offers extremely rapid network connectivity for GPU-to-GPU communication, with throughputs of up to 400Gb/s.
SuperNICs incorporate the following special qualities:
Ensuring that data packets are received and processed in the same sequence as they were originally delivered through high-speed packet reordering. This keeps the data flow’s sequential integrity intact.
In order to regulate and prevent congestion in AI networks, advanced congestion management uses network-aware algorithms and real-time telemetry data.
In AI cloud data centers, programmable computation on the input/output (I/O) channel facilitates network architecture adaptation and extension.
Low-profile, power-efficient architecture that effectively handles AI workloads under power-constrained budgets.
Optimization for full-stack AI, encompassing system software, communication libraries, application frameworks, networking, computing, and storage.
Recently, NVIDIA revealed the first SuperNIC in the world designed specifically for AI computing, built on the BlueField-3 networking architecture. It is a component of the NVIDIA Spectrum-X platform, which allows for smooth integration with the Ethernet switch system Spectrum-4.
The NVIDIA Spectrum-4 switch system and BlueField-3 SuperNIC work together to provide an accelerated computing fabric that is optimized for AI applications. Spectrum-X outperforms conventional Ethernet settings by continuously delivering high levels of network efficiency.
Yael Shenhav, vice president of DPU and NIC products at NVIDIA, stated, “In a world where AI is driving the next wave of technological innovation, the BlueField-3 SuperNIC is a vital cog in the machinery.” “SuperNICs are essential components for enabling the future of AI computing because they guarantee that your AI workloads are executed with efficiency and speed.”
The Changing Environment of Networking and AI
Large language models and generative AI are causing a seismic change in the area of artificial intelligence. These potent technologies have opened up new avenues and made it possible for computers to perform new functions.
GPU-accelerated computing plays a critical role in the development of AI by processing massive amounts of data, training huge AI models, and enabling real-time inference. While this increased computing capacity has created opportunities, Ethernet cloud networks have also been put to the test.
The internet’s foundational technology, traditional Ethernet, was designed to link loosely connected applications and provide wide compatibility. The complex computational requirements of contemporary AI workloads, which include quickly transferring large amounts of data, closely linked parallel processing, and unusual communication patterns all of which call for optimal network connectivity were not intended for it.
Basic network interface cards (NICs) were created with interoperability, universal data transfer, and general-purpose computing in mind. They were never intended to handle the special difficulties brought on by the high processing demands of AI applications.
The necessary characteristics and capabilities for effective data transmission, low latency, and the predictable performance required for AI activities are absent from standard NICs. In contrast, SuperNICs are designed specifically for contemporary AI workloads.
Benefits of SuperNICs in AI Computing Environments
Data processing units (DPUs) are capable of high throughput, low latency network connectivity, and many other sophisticated characteristics. DPUs have become more and more common in the field of cloud computing since its launch in 2020, mostly because of their ability to separate, speed up, and offload computation from data center hardware.
SuperNICs and DPUs both have many characteristics and functions in common, however SuperNICs are specially designed to speed up networks for artificial intelligence.
The performance of distributed AI training and inference communication flows is highly dependent on the availability of network capacity. Known for their elegant designs, SuperNICs scale better than DPUs and may provide an astounding 400Gb/s of network bandwidth per GPU.
When GPUs and SuperNICs are matched 1:1 in a system, AI workload efficiency may be greatly increased, resulting in higher productivity and better business outcomes.
SuperNICs are only intended to speed up networking for cloud computing with artificial intelligence. As a result, it uses less processing power than a DPU, which needs a lot of processing power to offload programs from a host CPU.
Less power usage results from the decreased computation needs, which is especially important in systems with up to eight SuperNICs.
One of the SuperNIC’s other unique selling points is its specialized AI networking capabilities. It provides optimal congestion control, adaptive routing, and out-of-order packet handling when tightly connected with an AI-optimized NVIDIA Spectrum-4 switch. Ethernet AI cloud settings are accelerated by these cutting-edge technologies.
Transforming cloud computing with AI
The NVIDIA BlueField-3 SuperNIC is essential for AI-ready infrastructure because of its many advantages.
Maximum efficiency for AI workloads:Â The BlueField-3 SuperNIC is perfect for AI workloads since it was designed specifically for network-intensive, massively parallel computing. It guarantees bottleneck-free, efficient operation of AI activities.
Performance that is consistent and predictable:Â The BlueField-3 SuperNIC makes sure that each job and tenant in multi-tenant data centers, where many jobs are executed concurrently, is isolated, predictable, and unaffected by other network operations.
Secure multi-tenant cloud infrastructure:Â Data centers that handle sensitive data place a high premium on security. High security levels are maintained by the BlueField-3 SuperNIC, allowing different tenants to cohabit with separate data and processing.
Broad network infrastructure:Â The BlueField-3 SuperNIC is very versatile and can be easily adjusted to meet a wide range of different network infrastructure requirements.
Wide compatibility with server manufacturers:Â The BlueField-3 SuperNIC integrates easily with the majority of enterprise-class servers without using an excessive amount of power in data centers.
#Describe a SuperNIC#On order to accelerate hyperscale AI workloads on Ethernet-based clouds#a new family of network accelerators called SuperNIC was created. With remote direct memory access (RDMA) over converged Ethernet (RoCE) te#it offers extremely rapid network connectivity for GPU-to-GPU communication#with throughputs of up to 400Gb/s.#SuperNICs incorporate the following special qualities:#Ensuring that data packets are received and processed in the same sequence as they were originally delivered through high-speed packet reor#In order to regulate and prevent congestion in AI networks#advanced congestion management uses network-aware algorithms and real-time telemetry data.#In AI cloud data centers#programmable computation on the input/output (I/O) channel facilitates network architecture adaptation and extension.#Low-profile#power-efficient architecture that effectively handles AI workloads under power-constrained budgets.#Optimization for full-stack AI#encompassing system software#communication libraries#application frameworks#networking#computing#and storage.#Recently#NVIDIA revealed the first SuperNIC in the world designed specifically for AI computing#built on the BlueField-3 networking architecture. It is a component of the NVIDIA Spectrum-X platform#which allows for smooth integration with the Ethernet switch system Spectrum-4.#The NVIDIA Spectrum-4 switch system and BlueField-3 SuperNIC work together to provide an accelerated computing fabric that is optimized for#Yael Shenhav#vice president of DPU and NIC products at NVIDIA#stated#“In a world where AI is driving the next wave of technological innovation#the BlueField-3 SuperNIC is a vital cog in the machinery.” “SuperNICs are essential components for enabling the future of AI computing beca
1 note
·
View note
Text
For those who are not aware: Bitlocker is encryption software, it encrypts your computer and makes it impossible to access the information on the computer unless you have the key.
It should be standard practice for IT companies to document the bitlocker keys as they are configuring bitlocker on a computer; generally you would do this by creating a record in your client management software for that specific device and putting the key in the record. Sometimes software can be used to extract that information in the event that it's necessary, but even if there's theoretically a way to extract the key, it should be documented somewhere *other* than on the encrypted computer.
This is something that a lot of IT people fuck up on kind of a lot (we've definitely had problems with missing bitlocker keys and I'm quite happy that the people who didn't document those keys aren't my coworkers anymore).
So what do you do if you want to use encryption software and you're NOT an IT company using a remote management tool that might be able to snag the keys?
When you are setting up encryption, put the encryption key in your password manager. Put it in your password manager. Document the important information that you cannot lose in your password manager. Your password manager is a good place to keep important things like your device encryption key, which you do not want lost or stolen. (If you run your password manager locally on an encrypted computer, export the data every once in a while, save it as an encrypted file, and put the file on your backup drive; you are going to have a bad time if your computer that hosts the only copies of your passwords shits the bed so *make a backup*)
This is my tip for home users for any kind of important recovery codes or software product keys: Print out the key and put it in your underwear drawer. Keep it there with your backup drive. That way you've got your important (small) computer shit in one place that is NOT your computer and is not likely to get shifted around and lost (the way that papers in desks often get shifted around and lost).
2K notes
·
View notes
Note
I need part 2 of that Alien BF, wanna see how my alien guy FUCK
I do too, trust, I do too. And believe that bro has been doing his homework.
I imagine he first discovered human sex during a romance movie you were showing him in the ship’s recreation area. It had been a long time since you had seen the movie too so you were excited to see their romance bloom again. But you had completely forgotten one vital thing. A tiny little sex scene that happens in the middle of the movie.
When it appeared you scrambled to skip past it. But at the same time, the remote conveniently went missing. Alien man saw it all and was enraptured.
Afterwards, when he asked you what that was, you bashfully explained that it’s a human mating custom. Alien man was in awe. That wasn’t how his species mated… but your version seemed like much more fun. He wondered if you’d show him how like you’ve been showing him everything else about humans. He wanted you to show him. And only you.
The idea of another member of the crew doing this with him made him recoil in disgust. No, you were… his mate. The only one he could do it with.
But he also wanted you to enjoy it. He didn’t want to trip over himself and be the only one feeling good from your first time together. So, like everything else he’s been learning about, he knew he needed to study. Getting your computer was easy given that he’s always had free access to all of your things. It was quite difficult to navigate the strange device but he remembered your lessons and found the search bar.
It took a few tries to word “human mating rituals” right to get the results he wanted. Eventually he got there. Each time he’d come back to study some more it got easier to navigate and find what he wanted to learn. He’d spend hours studying, trying to be the best he can for you. And every time after his member would ache with excitement to be with you.
Yet he never took care of himself, waiting patiently for the day he’ll be inside you.
#dragonsasks#monster fucker#monster smut#monster lover#monster lust#teratophillia#exophelia#monster fluff#monster romance#monster fic#monster imagine#monster bf#monster boyfriend#alien fucker#alien smut#alien lover#alien nsft#alien romance#alien boyfriend#alien concept#alien monster#alien series#alien anatomy#alien x reader#alien x human#alien x you#monster x reader#monster x human#monster x you#monster x y/n
724 notes
·
View notes
Text
⌖ Think I’m GOOD ENOUGH with a COMPUTER to get into SOMEONE ELSE’S? FIND OUT ON MY ALT STATION!
#⌖ online#// it doesn't involve a ton of technical knowledge!#tl;dr she's in her scambaiting arc and what happens is scammers pretend to be a reputable company and use remote access software to get into#a victim's computer. but it requires the victim to believe the scammer and download the software and accept connection. what baiters do is#simultaneously request access to the scammer's computer and social-engineer their way into getting the scammer to accept it.#newer scammers (who are usually the 'front line' ppl who pick up the calls) don't know better and accept the baiter's request.#and thus the scambaiter gets into the scammer's computer and wreaks havoc. (sometimes this means stealing their files. this hinders their#operation and takes away their list of victims and also have evidence to give to authorities. sometimes it means destroying their computer#by unleashing viruses/ransomware or locking them out of their computer by changing the password or syskeying.)#Al just wants to see if she can get access. She's watched her friend wreak havoc but she's not experienced with the remote softwares enough#to pull off a syskey. Not yet. She'll probably change their desktop to a picture of her though. Something silly like that.#Screenshot their desktop and then delete their icons and replace their desktop with a pic of the bg + icons so they can go insane clicking#on the 'icons' and wondering why the icons won't open. Set the text on their computer backwards. Basically... be a nuisance.#Her friend subscribed a scammer to Al's channel (as well as his own) so she'll probably subscribe the scammer to her and her friend.#(yes she considers her scambaiter v*xtuber friend to be her friend! they are friends now. superficial friends.)
1 note
·
View note