I can assure you that before I set up Cloudflare, I was getting hit by SYN floods filling up the entire bandwidth of my home DSL2 connection multiple times a week.
I can assure you that before I set up Cloudflare, I was getting hit by SYN floods filling up the entire bandwidth of my home DSL2 connection multiple times a week.
But… these people are dead.
No, it was compiled by the team which maintains my distro’s package repository, and cryptographically verified to have come from them by my package manager. That’s a lot different than downloading some random executables I pulled from a website I’d never heard of before and immediately running them as root.
I would say the vast majority of people (across all generations) either don’t know, or don’t really understand how extensive it (the monitoring) is and what the consequences of that are.
Downside: it’s entirety manual and not scalable whatsoever.
Virtually all modern x86 chips work that way
poweredge-t620-0
poweredge-t620-1
poweredge-r520-0
macbook-2011
pi-0
through pi-3
having read all these other comments, i’m now feeling like i should come up with a more creative naming scheme… for what it’s worth, my phone is named bob
.
IBM System-Z mainframes still support CPU hot-swapping AFAIK.