Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)BI
Posts
0
Comments
212
Joined
2 yr. ago

  • Have you tried using file versioning, or using review (track changes) functions to propose changes so you can choose to accept edits or decide against them? It's like there are specific features for this scenario that allow you to save, have backups and have that control.

  • This is an insane scenario: my software design decision is, despite recovery mechanisms like previous versions, file history, and undo mechanisms, I'm afraid if a cat uses a keyboard I'll accidentally save changes I don't want to a word document.

    Lol. The only user error was choosing libre office instead of a user friendly software stack that has reasonable defaults and r recovery mechanisms.

  • IP and Routing is layer 3, broadcast is layer 2 with Mac addresses being shared within a broadcast domain (often a vlan/lan) and the only requirement for layer 2 is a switch you don't need routers. Devices on a lan talk only via switches which switch based on Mac address tables. You don't learn Mac addresses of devices past your broadcast domain, that's what a router handles.

    So in network practice (nothing Linux related) if you are on a broadcast network that's a /24 subnet, what should happen is all devices within that subnet talk to each other without using a router, instead they learn a mac address and the associated ip from a broadcast from the device which owns it.

    If you tell your device that it's only on a /32 then it should discard every arp it hears as invalid. Which means it won't learn any neighbouring lan devices.

    While your network on your single device with the /32 probably works ok to get to other networks (routed networks like internet or other vlans), because other networks ask the router, and the router probably learned your mac and ip on whatever vlan/interface your device is connected via.

    But unless you're trying to do something unconventional, devices on a lan should match the routers expected subnet. This way devices can trust their assumption that within their subnet they communicate to other local devices by learning other network devices network address via arp, and communicate directly in unicast via learned ips from that arp. If it's outside the subnet they then look to the gateway. They trust the gateway. The gateway should route to the right interface or next hop.

    If you really wanted to make this work though, usually routers can proxy arp. So in this case, you tell the router to 'oroxy' and broadcast your arp to other devices. Those devices on your lan looking for your ip will find the routers Mac address, then using destination network address translation you can redirect the incoming connection from a lan device to your device via your router. Then your /32 ip can probably work. Usually this is done when someone has put a static ip on a device with a wrong subnet ip on a vlan with another subnet. So the device which arps is ignored by the router and the other network devices. If you use the router to proxy arp you can basically give the local lan devices an ip to hit that they expect, which then you can translate to the misconfigured device. This generally is considered a bandaid solution temporary until a vendor or technician can fix their misconfiguration. I do not recommend.

  • There's a few random projects that aim to store bulk data and human information in durable materials.

    https://www.popsci.com/technology/5d-disc-stores-500-tb-of-data/

    Professor Peter Kazansky, from the ORC, says: "It is thrilling to think that we have created the technology to preserve documents and information and store it in space for future generations. This technology can secure the last evidence of our civilisation: all we've learnt will not be forgotten."

    I'm learning most of the articles are all based on this guy from 2013 until now it's still been in mostly research phase though proof of concepts have been done.

    I'm trying to find evidence of another thing I swear I heard about where someone had some instructions from first principals how to read the data, but all the way from something like understanding the language to data format. I listened to something in a tech podcast but can't find it.

  • I get that on vpn, I just choose between the option of not following the link that I've been given, or alternatively, changing vpn locations which costs me literally fractions of a second.

    I imagine this is some attempt to stop bots but my I can only imagine genuine users get mad while bots just change location again just like I do.

    Kind of like drm, the only ones affected are those who are legitimate buyers.

    Of course my opinion is based on nothing but assumptions since I dare not bother spending time there.

  • The guy said brute force but meant credential stuffing.

    Basically using an army of remote compromised devices to use known user name password combinations. If they used the same email and password that was found on another compromise, then their account would successfully be logged in first try from a unique ip each time.

  • Internode was bought by TPG a long while ago and many of the original founding team started Aussie broadband with similar ideals. They'll end up selling that to TPG too probably, but right now they're ok and they have partnered with optus for cellular tower coverage.

    By the way if you want to make informed decisions about cell tower coverage, there's an app called "aus phone tower" by bit bot software which gives you exact cellular tower information. Use that to figure out coverage before you choose a mobile provider network.

  • Not to boast MS, but its service life is longer than Linux at 10 years. Lts on Linux is generally at best 8. Ltsc on Windows is much longer. Windows 10 released on 2015 and the ltsc ends at 2027 on the enterprise channel, or 2025 for the consumer general availability.

    I'm only commenting because I dislike misinformation more than I dislike MS.

  • Yes but also no, but also yes. Here's why:

    • yes: most people don't use cabled headphones
    • no: high quality headphones require a jack
    • yes: those high quality headphones need amplifiers beyond what the phones inbuilt dac can handle

    So I'd probably overall argue that those who really care about audio probably have a separate DAC like https://www.techradar.com/audio/hi-fi/ifi-hip-dac-3-review

    Which is probably an unpopular opinion.

  • I'm just going to give you props. I have worked in Managed IT Services for a dozen years and some of the worst clients are construction, engineering and architects who use solidworks, autodesk and archicad products.

    You've eaten humble pie and admitted that using computers as a tool, and systems design are different and though you might understand a lot, just like I can build a 3d model, the devil is in the detail.

    Building robust solutions that meet your business continuity plans, disaster recovery plans, secure your data for cyber risk and to meet ISO and yet are still somehow usable in a workflow for end users is not something you just pick up as a hobby and implement.

    The way I handle technology Lifecycle is in 5 steps: strategy, plan, implement, support, maintain. Each part has distinct requirements and considerations. It's all well and good to implement something but you need to get support when it goes wrong or misbehaves. You need to monitor and report for backups, patching, system alerts. Lots of people might do the implement, but consider the Lifecycle of the solution.

    People do these things at home but they're home labbing, they're labs. Production requires more.

    Anyway a bunch of people closer to your part of the world will probably help you out here.

    I just want to again recognise and compliment you on realising and openly saying you want help rather than just do the usual "oh I know best" that I hear over and over usually just before someone gets ransomed on their never patched log4j using openssl heartbleed publicly exposed server infrastructure.

  • Lol, a thousand hours would be 6 months of full time work (40 hour week). I'm not sure I'd employ someone who has 6 months of IT experience into a systems administrator job and task them to build a an erp/dms/unified coms solution for a client.

    But this guy should be able to do it as a hobby?