The Best of the Wonders of the World Wide Web

https://theawesomer.com/photos/2024/10/best_wonders_of_the_world_wide_web_t.jpgTo help raise funds to support the recently attacked non-profit Internet Archive, Wonders of the World Wide Web creator Squirrel Monkey assembled this great compilation of their hilarious retro-tech parody videos. Along the way, you’ll learn how sites like Amazon, Twitch, Netflix, and Reddit worked in the days of dial-up modems.The Awesomer

Babylon Bee Releases Movie

https://media.babylonbee.com/articles/670942b84f1bc670942b84f1bd.jpg

WORLD β€” Today marks the historic release day of January 6, The Most Deadliest Day, an already critically acclaimed documentary chronicling the deadliest and darkest and scariest event in world history: the January 6 insurrection.

Critics are lauding the film as "not the worst thing I’ve seen," and "eh, kinda funny." Liberals, on the other hand, have marked the momentous day by screaming and crying and wetting their pants in rage and confusion.

"How did we as a country get to the point where The Babylon Bee can just make a film about January 6 without facing serious consequences?" said a tearful Obama to reporters. "This film is an attack on our sacred democracy and the communist global order I have dedicated my whole life to building. I am literally shaking right now."

Eyewitnesses confirmed Obama then calmed himself down by launching a drone attack in Yemen.

Attorney General Merrick Garland has also responded, instructing FBI field offices to keep a close eye on anyone who dares to watch the film. "Watching this film is an attack on our sacred democracy," he said between sobs. "I am literally throwing up just thinking about it."

Sources confirmed the new film is available at BabylonBee.com/january6 and is only available to subscribers.


BIG NEWS: We made a movie, and you can watch the trailer NOW:

Click here to find out how you can watch the movie when it releases on October 11

Babylon Bee

Hacked Robot Vacuums Across the U.S. Started Yelling Slurs

https://gizmodo.com/app/uploads/2024/10/GettyImages-1945576383.jpg

It’s a tale as old as… the Internet of Things era. Robot vacuums made by Ecovacs have been reported roving around people’s homes, yelling profanities at them through the onboard speakers after the company’s software was found to be vulnerable to intrusion.

ABC News in Australia reports that there were recently multiple instances across the U.S. when owners of Ecovacs vacuums noticed their devices acting unusually.

β€œIt sounded like a broken-up radio signal or something,” Daniel Swenson told the outlet. β€œYou could hear snippets of maybe a voice.” He opened the vacuum’s app to find a stranger was accessing its live camera feed and remote control feature, but assumed it might be an error. After resetting the password and rebooting the robot, the vacuum quickly started moving again:

This time, there was no ambiguity about what was coming out of the speaker. A voice was yelling racist obscenities, loud and clear, right in front of Mr Swenson’s son.

β€œF*** n******s,” screamed the voice, over and over again.

Perhaps the best part of this anecdote was Swenson’s incredulous conclusion that the situation β€œcould have been worse.” But he’s right that it was nice of the hacker to let him know his vacuum was hacked instead of spying on him indefinitely.

The most common issue people have with so-called β€œsmart” home devices is that they often require a software subscription to access most functionality, and if the manufacturer goes under or stops supporting the device, it simply becomes a paperweight.

The more disturbing issue arises when smart devices are remotely accessed and the manufacturer never considered (or cared about) the possibility that tricksters might take advantage of this to torment people in their own homes. Remote access is convenient, but every couple of years we hear about something egregious, like intruders accessing a baby monitor and whispering through it at night, or gaining access to your garage door to mess with its owner. Β A lot of the time the intent of these intruders is just to be punks. But you have to wonder how many times it happens and no one knows about it.

The problem is that most of these smart home companies are selling consumer hardware and don’t want or care to invest much in security. You can buy one of dozens of robovacs on Amazon; most people want the cheapest one. So this is what we get, a company that doesn’t put basic security measures in place.

And β€˜basic’ seems to be fair here. ABC found that although Ecovacs accounts are password-protected, and a further four-digit PIN code is required to access the video feed, that PIN code is not validated server-sideβ€”meaning anyone with the basic know-how of a tool like Chrome web inspector could bypass it. It’s likely that Swenson was reusing credentials from other services, but the code should have been an extra factor that prevented access. At a bare minimum all Ecovacs really needs to do is some basic β€œif-true” validation on its servers before opening the video feed.

Ecovacs reportedly was informed about the vulnerability back in 2023 and didn’t take action until recently. It says a more substantial security update will be released in November.

If you are paying rock-bottom prices for a robot vacuum, you may get what you’re paying for.

Gizmodo

You Might Still Be Making These 7 Mistakes on Facebook

https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2024/10/a-person-using-facebook-on-their-smartphone-with-warning-icons-in-the-background.jpg

Social media platforms like Facebook are excellent for connecting with people online, but it’s important to be cautious. Here are some common mistakes you might be making on Facebook without even realizing it.

MAKEUSEOF VIDEO OF THE DAY
SCROLL TO CONTINUE WITH CONTENT

1 Oversharing About Your Personal Life

While it’s natural to want to connect with friends and family by sharing updates about your life, revealing too much information can compromise your privacy and security. Sharing things like your location, daily routines, or family information can expose you to potential privacy breaches.

This information can be exploited by hackers, stalkers, or even advertisers seeking to target you more aggressively. For example, posts about vacations can signal to potential burglars that your home is empty, significantly increasing the risk of a break-in. Additionally, sharing real-time updates can inadvertently inform malicious actors of your whereabouts, leaving you vulnerable.

It’s best to limit the details you share about your daily life. Consider curating your posts and keeping sensitive information for private conversations rather than sharing it publicly.

2 Including Excessive Details in Your Bio

a person using facebook on a laptop
DenPhotos /Β Shutterstock

It’s not just about what you post; it’s also important to reflect on the details you’ve included in your bio and how much information you’ve shared there. You may have unwittingly disclosed excessive personal details, such as phone numbers, email addresses, significant life events, and intimate family information.

It’s crucial to remember that your Facebook profile may be visible to strangers, especially if your privacy settings aren’t properly configured. This level of openness can leave you vulnerable to harassment or unwanted contact from individuals with ill intentions. Personal information is also used in spear phishing scams.

Rather than sharing sensitive information in your bio, consider offering a concise overview of your interests, hobbies, or professional background. This will allow you to convey your personality without compromising your privacy.

3 Spreading Misinformation or Unverified News

These days, social media platforms like Facebook serve as major sources of news and information for many. However, the ease of sharing content has also contributed to the widespread dissemination of misinformation and unverified news.

When you share articles, memes, or posts without verifying their accuracy or understanding their sources, you may unintentionally contribute to the spread of misinformation. This can be especially harmful, as misinformation has the potential to incite panic, shape public opinion, and even influence elections.

To combat this, it’s essential to verify the credibility of any information before sharing it. Engaging critically with what you read helps prevent the spread of misinformation and contributes to a more informed community. Every post you share has the potential to influence others, so ensure that the message you’re amplifying is accurate and valuable.

4 Engaging in Toxic Discussions or Trolling

a person tapping a comment button on facebook
Mircea Moira / Shutterstock

Facebook is a platform designed for connection, yet it often becomes a battleground for toxic discussions and trolling. What may seem funny or harmless to you can be offensive or hurtful to others. It’s important to understand that engaging in heated debates or making sarcastic comments can escalate tensions and contribute to a hostile environment.

Toxic discussions not only damage relationships but can also tarnish your online reputation. Once words are typed and posted, they can spread rapidly, leaving a permanent mark on your digital footprint. Consider whether your words will contribute to a healthy dialogue or simply escalate tension. After all, social media should be a space for connection and understanding, not conflict and division.

5 Allowing Your Profile to Be Discoverable by Search Engines

By default, your Facebook profile is discoverable through search engines. This means that anyone can find your account simply by typing in your name in a Google or Bing search. While this may seem harmless, it can compromise your privacy and security. Strangers or unwanted acquaintances can easily locate your profile and gather personal information that could be used for malicious purposes.

Even if you believe your privacy settings are strict, search engine visibility can undermine those protections. Search engines index your information regardless of your privacy preferences, which can expose you to unwanted friend requests, harassment, or even identity theft.

To avoid this, it’s best to make your Facebook profile unsearchable via search engines. For that, open Facebook and head to Settings & privacy > Audience and visibility > How people find and contact you. Then, turn off the toggle next to Do you want search engines outside of Facebook to link to your profile.

6 Failing to Adjust Critical Privacy Settings

One of the most significant mistakes Facebook users make is neglecting to adjust their privacy settings. Sticking with the default settings often allows broader access to your profile and posts than you might realize.

For instance, by default, Facebook allows anyoneβ€”regardless of whether they are friendsβ€”to view your friends list, bio, and the pages you follow. This can lead to unintended exposure of personal information to strangers, increasing the risk of privacy breaches.

Moreover, you may not realize that your posts can be visible to the public, depending on your settings. Even seemingly innocent information can be misused by malicious actors. Therefore, it is essential to take the time to enhance your Facebook profile’s privacy by manually adjusting the privacy settings or using the Privacy Checkup tool.

7 Overlooking Essential Account Security Measures

person inputting 2fa password into laptop and smartphone
LookerStudio/Shutterstock

Keeping your Facebook account secure may not seem important, but it’s crucial for protecting your personal information and online identity. One common oversight is failing to enable two-factor authentication (2FA). Without it, your account is more vulnerable to unauthorized access, especially if your passwords are weak or reused across multiple platforms.

Over time, you may have unknowingly granted third-party apps and websites access to your Facebook account. These apps often require permissions that extend beyond what is necessary for their functionality, making it essential to regularly audit and manage these permissions. By taking a few moments to reassess what apps have access to your account and limiting permissions where possible, you can significantly enhance your data security.

In the fast-paced world of social media, it’s easy to fall into the trap of making mistakes, from oversharing personal information to neglecting privacy settings. However, by being aware of these common missteps, you can take proactive steps to enhance your Facebook presence and use the platform more effectively.

MakeUseOf

You Might Still Be Making These 7 Mistakes on Facebook

https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2024/10/a-person-using-facebook-on-their-smartphone-with-warning-icons-in-the-background.jpg

Social media platforms like Facebook are excellent for connecting with people online, but it’s important to be cautious. Here are some common mistakes you might be making on Facebook without even realizing it.

MAKEUSEOF VIDEO OF THE DAY
SCROLL TO CONTINUE WITH CONTENT

1 Oversharing About Your Personal Life

While it’s natural to want to connect with friends and family by sharing updates about your life, revealing too much information can compromise your privacy and security. Sharing things like your location, daily routines, or family information can expose you to potential privacy breaches.

This information can be exploited by hackers, stalkers, or even advertisers seeking to target you more aggressively. For example, posts about vacations can signal to potential burglars that your home is empty, significantly increasing the risk of a break-in. Additionally, sharing real-time updates can inadvertently inform malicious actors of your whereabouts, leaving you vulnerable.

It’s best to limit the details you share about your daily life. Consider curating your posts and keeping sensitive information for private conversations rather than sharing it publicly.

2 Including Excessive Details in Your Bio

a person using facebook on a laptop
DenPhotos /Β Shutterstock

It’s not just about what you post; it’s also important to reflect on the details you’ve included in your bio and how much information you’ve shared there. You may have unwittingly disclosed excessive personal details, such as phone numbers, email addresses, significant life events, and intimate family information.

It’s crucial to remember that your Facebook profile may be visible to strangers, especially if your privacy settings aren’t properly configured. This level of openness can leave you vulnerable to harassment or unwanted contact from individuals with ill intentions. Personal information is also used in spear phishing scams.

Rather than sharing sensitive information in your bio, consider offering a concise overview of your interests, hobbies, or professional background. This will allow you to convey your personality without compromising your privacy.

3 Spreading Misinformation or Unverified News

These days, social media platforms like Facebook serve as major sources of news and information for many. However, the ease of sharing content has also contributed to the widespread dissemination of misinformation and unverified news.

When you share articles, memes, or posts without verifying their accuracy or understanding their sources, you may unintentionally contribute to the spread of misinformation. This can be especially harmful, as misinformation has the potential to incite panic, shape public opinion, and even influence elections.

To combat this, it’s essential to verify the credibility of any information before sharing it. Engaging critically with what you read helps prevent the spread of misinformation and contributes to a more informed community. Every post you share has the potential to influence others, so ensure that the message you’re amplifying is accurate and valuable.

4 Engaging in Toxic Discussions or Trolling

a person tapping a comment button on facebook
Mircea Moira / Shutterstock

Facebook is a platform designed for connection, yet it often becomes a battleground for toxic discussions and trolling. What may seem funny or harmless to you can be offensive or hurtful to others. It’s important to understand that engaging in heated debates or making sarcastic comments can escalate tensions and contribute to a hostile environment.

Toxic discussions not only damage relationships but can also tarnish your online reputation. Once words are typed and posted, they can spread rapidly, leaving a permanent mark on your digital footprint. Consider whether your words will contribute to a healthy dialogue or simply escalate tension. After all, social media should be a space for connection and understanding, not conflict and division.

5 Allowing Your Profile to Be Discoverable by Search Engines

By default, your Facebook profile is discoverable through search engines. This means that anyone can find your account simply by typing in your name in a Google or Bing search. While this may seem harmless, it can compromise your privacy and security. Strangers or unwanted acquaintances can easily locate your profile and gather personal information that could be used for malicious purposes.

Even if you believe your privacy settings are strict, search engine visibility can undermine those protections. Search engines index your information regardless of your privacy preferences, which can expose you to unwanted friend requests, harassment, or even identity theft.

To avoid this, it’s best to make your Facebook profile unsearchable via search engines. For that, open Facebook and head to Settings & privacy > Audience and visibility > How people find and contact you. Then, turn off the toggle next to Do you want search engines outside of Facebook to link to your profile.

6 Failing to Adjust Critical Privacy Settings

One of the most significant mistakes Facebook users make is neglecting to adjust their privacy settings. Sticking with the default settings often allows broader access to your profile and posts than you might realize.

For instance, by default, Facebook allows anyoneβ€”regardless of whether they are friendsβ€”to view your friends list, bio, and the pages you follow. This can lead to unintended exposure of personal information to strangers, increasing the risk of privacy breaches.

Moreover, you may not realize that your posts can be visible to the public, depending on your settings. Even seemingly innocent information can be misused by malicious actors. Therefore, it is essential to take the time to enhance your Facebook profile’s privacy by manually adjusting the privacy settings or using the Privacy Checkup tool.

7 Overlooking Essential Account Security Measures

person inputting 2fa password into laptop and smartphone
LookerStudio/Shutterstock

Keeping your Facebook account secure may not seem important, but it’s crucial for protecting your personal information and online identity. One common oversight is failing to enable two-factor authentication (2FA). Without it, your account is more vulnerable to unauthorized access, especially if your passwords are weak or reused across multiple platforms.

Over time, you may have unknowingly granted third-party apps and websites access to your Facebook account. These apps often require permissions that extend beyond what is necessary for their functionality, making it essential to regularly audit and manage these permissions. By taking a few moments to reassess what apps have access to your account and limiting permissions where possible, you can significantly enhance your data security.

In the fast-paced world of social media, it’s easy to fall into the trap of making mistakes, from oversharing personal information to neglecting privacy settings. However, by being aware of these common missteps, you can take proactive steps to enhance your Facebook presence and use the platform more effectively.

MakeUseOf

Optimize Your SQLite Database with the Laravel Optimize DB Package

https://picperf.io/https://laravelnews.s3.amazonaws.com/featured-images/laravel-optimize-db-featured.png

Optimize Your SQLite Database with the Laravel Optimize DB Package

The Laravel Optimize DB package provides a good starting point for production-ready SQLite databases. Pest creator and core Laravel team member Nuno Maduro created this package.

This package is meant for SQLite (3.46+) in a Laravel project and works by applying migration to your project and runtime configuration applied via the package’s service provider. It applies the following settings at the time of writing:

 β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
 β”‚ Setting                   β”‚ Value       β”‚ Via       β”‚
 β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
 β”‚ PRAGMA auto_vacuum        β”‚ incremental β”‚ Migration β”‚
 β”‚ PRAGMA journal_mode       β”‚ WAL         β”‚ Migration β”‚
 β”‚ PRAGMA page_size          β”‚ 32768       β”‚ Migration β”‚
 β”‚ PRAGMA busy_timeout       β”‚ 5000        β”‚ Runtime   β”‚
 β”‚ PRAGMA cache_size         β”‚ -20000      β”‚ Runtime   β”‚
 β”‚ PRAGMA foreign_keys       β”‚ ON          β”‚ Runtime   β”‚
 β”‚ PRAGMA incremental_vacuum β”‚ (enabled)   β”‚ Runtime   β”‚
 β”‚ PRAGMA mmap_size          β”‚ 2147483648  β”‚ Runtime   β”‚
 β”‚ PRAGMA temp_store         β”‚ MEMORY      β”‚ Runtime   β”‚
 β”‚ PRAGMA synchronous        β”‚ NORMAL      β”‚ Runtime   β”‚
 β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

High Impact Settings

I won’t cover each setting, but the following three settings could potentially have a highly positive impact on SQLite performance.

journal_mode = WAL:

  • Why it’s beneficial: Write-Ahead Logging (WAL) is one of the most effective ways to improve concurrency and performance in SQLite, especially for applications that need to support multiple readers and writers. It allows the database to handle many reads simultaneously while still maintaining atomicity and durability for writes.
  • Use case: Great for databases with mixed read/write workloads and high concurrency requirements.

β €cache_size = -20000 (20 MB cache):

  • Why it’s beneficial: Increasing the cache size helps store more pages in memory, reducing the need for disk I/O. This is especially useful for databases that are read frequently or have hot data. A larger cache means fewer page reads from disk, resulting in faster query responses.
  • Use case: Important when dealing with large datasets and you have sufficient memory resources available.

β €mmap_size = 2147483648 (2 GB memory mapping):

  • Why it’s beneficial: Memory-mapping the database file can dramatically improve performance by reducing the overhead associated with file system operations. It allows the database to access data directly in memory, bypassing the need for repeated system calls to read or write data.
  • Use case: Very beneficial for large databases on systems with ample memory, where file access speed is a priority.

The package is considered a work-in-progress, so use it carefully. The package advises not to use it in production yet and to back up your database before requiring it. You can learn more about this package and view the source code on Github.


The post Optimize Your SQLite Database with the Laravel Optimize DB Package appeared first on Laravel News.

Join the Laravel Newsletter to get all the latest
Laravel articles like this directly in your inbox.

Laravel News

How Mossad Planned Its Exploding Pager Operation: Inside Israel’s Penetration of Hezbollah

The Washington Post interviewed Lebanese officials, people close to Hezbollah, and Israeli, Arab and U.S. security officials and politicians about a years-long plan (originated at Mossad headquarters) that ultimately killed or maimed "as many as 3,000 Hezbollah officers and members β€” most of them rear-echelon figures… along with an unknown number of civilians… when Israel’s Mossad intelligence service triggered the devices remotely on September 17."
In the initial sales pitch to Hezbollah two years ago, the new line of Apollo pagers seemed precisely suited to the needs of a militia group with a sprawling network of fighters and a hard-earned reputation for paranoia… Best of all, there was no risk that the pagers could ever be tracked by Israel’s intelligence services. Hezbollah’s leaders were so impressed they bought 5,000 of them and began handing them out to mid-level fighters and support personnel in February. None of the users suspected they were wearing an ingeniously crafted Israeli bomb… Israeli officials had watched with increasing anxiety as the Lebanese group added new weapons to an arsenal already capable of striking Israeli cities with tens of thousands of precision-guided missiles. Mossad, the Israeli intelligence service responsible for combating foreign threats to the Jewish state, had worked for years to penetrate the group with electronic monitoring and human informants. Over time, Hezbollah leaders learned to worry about the group’s vulnerability to Israeli surveillance and hacking, fearing that even ordinary cellphones could be turned into Israeli-controlled eavesdropping and tracking devices. Thus was born the idea of creating a kind of communications Trojan horse, the officials said. Hezbollah was looking for hack-proof electronic networks for relaying messages, and Mossad came up with a pair of ruses that would lead the militia group to purchase devices that seemed perfect for the job β€” equipment that Mossad designed and had assembled in Israel. The first part of the plan, booby-trapped walkie-talkies, began being inserted into Lebanon by Mossad nearly a decade ago, in 2015. The mobile two-way radios contained oversized battery packs, a hidden explosive and a transmission system that gave Israel complete access to Hezbollah communications. For nine years, the Israelis contented themselves with eavesdropping on Hezbollah, the officials said, while reserving the option to turn the walkie-talkies into bombs in a future crisis. But then came a new opportunity and a glitzy new product: a small pager equipped with a powerful explosive. In an irony that would not become clear for many months, Hezbollah would end up indirectly paying the Israelis for the tiny bombs that would kill or wound many of its operatives. Because Hezbollah leaders were alert to possible sabotage, the pagers could not originate in Israel, the United States or any other Israeli ally. So, in 2023, the group began receiving solicitations for the bulk purchase of Taiwanese-branded Apollo pagers, a well-recognized trademark and product line with a worldwide distribution and no discernible links to Israeli or Jewish interests. The Taiwanese company had no knowledge of the plan, officials said… The marketing official had no knowledge of the operation and was unaware that the pagers were physically assembled in Israel under Mossad oversight, officials said… In a feat of engineering, the bomb component was so carefully hidden as to be virtually undetectable, even if the device was taken apart, the officials said. Israeli officials believe that Hezbollah did disassemble some of the pagers and may have even X-rayed them. "Thousands of Apollo-branded pagers rang or vibrated at once, all across Lebanon and Syria," according to the article, with a short sentence in Arabic that said "You received an encrypted message." The two-button de-encryption procedure "ensured most users would be holding the pager with both hands when it detonated," according to the article, although "Less than a minute later, thousands of other pagers exploded by remote command, regardless of whether the user ever touched his device. The following day, on September 18, hundreds of walkie-talkies blew up in the same way, killing and maiming users and bystanders…" "As Hezbollah reeled, Israel struck again, pounding the group’s headquarters, arsenals and logistic centers with 2,000-pound bombs," the article concludes. And the strike "convinced the country’s political leaders that Hezbollah could be put on the ropes, susceptible to a systematic dismantling using airstrikes and, eventually a ground invasion…"


Read more of this story at Slashdot.

Slashdot