The bit locker key is saved to the Microsoft account of the user who set up the computer. I was messing with Linux on my new laptop and learned the hard way when it refused to boot back into Windows.
Calgary boy.
- 0 Posts
- 9 Comments
Mark@lemmy.cato Fediverse@lemmy.world•In response to the lemmy.ml moderation polemic: beware of bad faith agents!English1·1 year agoYou posted where you and your content were obviously not welcome, and you got banned. I don’t think that is the work of a bad faith actor at all.
Mark@lemmy.cato Privacy@lemmy.ml•Android offering privacy by profiling and sharing app ussage info?English0·1 year agoTheir content blocking seems to run on a cloud service that you connect to via their app but it looks like it works the same for the end user.
Mark@lemmy.cato Privacy@lemmy.ml•Android offering privacy by profiling and sharing app ussage info?English2·1 year agoDNS66 from F-Droid.
I have used a lot of stuff over the years but my favorite would have to be a little command line program called cowsay. It takes whatever text you feed it and puts it in a speech bubble above a cow, hence the name.
Mark@lemmy.catoAsklemmy@lemmy.ml•What is the craziest thing that's ever happened in your life?1·2 years agoThe shrink said it was triggered by stress at work. I was also on ADHD medication which can contribute but they didn’t think it was the cause or anything.
No, no interest in the Russian mafia but the guy who lived in the apartment below me where I first heard the voices was named Wlad so that’s where my mind went I guess.
Mark@lemmy.catoAsklemmy@lemmy.ml•What is the craziest thing that's ever happened in your life?10·2 years agoI had a psychotic break. Of course, I did not know I had developed a mental illness. I thought the Russian mafia was coming to kill me and my family. That made for a very crazy year before I finally got treatment.
Mark@lemmy.cato Technology@beehaw.org•Mastodon thinks Lemmy’s privacy stinks. What say you?English2·2 years agoApple (and Google, Microsoft, etc) are checking signatures of all files on their services to detect illegal stuff. They do it for copyrighted content and they do it for CSAM.
I work for a digital display company, and it is definitely redundancy. There will be at least two redundant display systems that go to the modules separately so they can switch between them to solve issues. If a component fails on one side they just switch to the other.