• 6 Posts
  • 14 Comments
Joined 1 year ago
cake
Cake day: June 19th, 2023

help-circle


  • There’s really not much to it. I don’t understand why you’re so dumbfounded such a thing is possible. People steal or buy up formula. Those who steal it make a profit no matter what price they sell it at. Those who live in an area where it sells out have the ability to mark it up big time. Paying 10 extra bucks is better than driving hours away with the hope they have it in stock there. People will sell it on offerup, craigslist, facebook, etc. Search for “formula” offerup if you’re in the US and you’ll likely see it. This was especially a problem during Covid and we saw the same scheme extend to many other products. In 2022, there was a massive shortage for the better part of a year. Any that came around got bought up immediately - by some that were lucky enough to get it at the right time and the rest by scalpers. This is not a new thing and I find it surprising that you’re so surprised. I often see them locked up and purchase limits at the store because of this.







  • This is true today. Had you tried that back in 2005, you’d very likely be fiddling with drivers. I specifically remember making a disk that contained all the drivers I’d need if I had to reinstall for any reason. Without it and without a network, you’d have to have another computer available to grab drivers from the internet.








  • I think when people say it is a smaller target for virii, they are talking about an actual virus such as ransomware, crypto miner, adware, trojans, etc. I have zero doubt these types of virii are more targeted on Windows platforms. Linux servers on the other hand are indeed going to be the largest target for exploits. The primary mechanism by which a Linux server is compromised is going to be via an exploit, not an actual virus. That’s not to say they don’t exist. I administer hundreds of Linux servers in several data centers. I don’t believe I’ve ever come across an actual virus in the last decade or so, but do deal with exploit and brute force attempts nonstop. Perhaps this is a matter of semantics. I don’t consider the tools and methods used to exploit systems as a virus.