Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)TH
Posts
5
Comments
730
Joined
2 yr. ago

  • Ours basically added MacOS as an option because they didn’t want to manage Linux and there are standard security tools for it. I don’t mind MacOS, it has its quirks, but it beats W11. I had an HP with Linux there before the company decided to drop it and I do miss it, but knowing I’d have to now have a Dell with Linux if they still had the option, I’ll take the Apple hardware knowing all the issues the windows guys have.

  • Our shop has two options (for security and management, they keep the options lean). Dell Windows 11 machines and Mac. The suckiness of the Dell ecosystem, combined with Windows 11 being fairly terrible, has pushed most all of my colleagues over to Mac over the last few years. Even most of the ASP.NET developers are on Mac at this point. This just solidifies that direction even further.

  • If your cybersecurity and/or SecOps team isn’t working 40 hrs a week, you’re either WAY over staffed or you’re missing out on a lot of proactive security work. Ours has a massive backlog of tickets and is working proactively on protecting and preventing incursions and security incidents.

  • As a “prosumer” photographer (I do semi-pro landscape photography mostly, with a little astrophotography as a hobby when the sky is clear enough), I’ve been really happy with Affinity Photo over the Adobe suite. Definitely recommend. I just hope they keep their quality up since being bought out.

  • One thing I like to tell people with that attitude is: whatever someone does, there’s always someone else who will see it as an example and challenge to do it “better”. Do you want to be the company that started that chain? Are you prepared to compete in that race?

    For something borderline malware, someone will take your lead and make it “better malware”. If you are not prepared to respond in kind, then why did you even go there? If you’re not ready to be known as the top of the line malware creator, why start the product line?

  • Unless I get a full week off every other week, there’s not a number high enough that I’d do 84hrs a week. I’d be slightly tempted if I could make enough to completely retire in a 1-4 months, but that’s not what they’re going for, they’re going for continued employment at 84 hrs a week.

  • Definitely. Though I’ll add that I ran PiHole + PiVPN on a Zero W ($10) for years. I upgraded it to a Pi Zero W 2 ($15 with extra cores) but I found that it had terrible packet drops, so I had to add a $15 usb wired adapter to it. I can max my upload speeds over vpn and dns is super low latency.

  • As long as you’re not using DNSSEC, you can easily run your own. I’ve been running a PiHole for years now, it can pull in block lists and such from various sources, it’d be fairly easy to add a list to pull in automatically that include extra records. Those could be served from anywhere. Torrents, git repos, http calls, etc.

  • I had an Athlon motherboard with voice POST messages… one night I woke up to it saying “your CPU has a problem!” over and over and was freaked out until I was completely awake and figure out what was wrong.

    It wasn’t high quality coming through the piezo speaker, but it was good enough.

  • Generally a firing is decided the previous day or at least an hour before it happens. Discussions are made prior to the actual meeting where the firing occurs. IT is on standby. They either deactivate the AD account and related auth methods when the employee walks in the office to have the discussion. This is a well oiled machine, so that all parties know their parts. The meeting/discussion is solely a formality and by two minutes into it, theres no longer any access granted. Security shows up at the meeting to escort the employee out and collect their badge or keys. Maybe they let the employee walk by their desk to collect their stuff, maybe the employer ships it to them later, depends on the circumstances and office layout.

  • What does he think, Apple is going to release a keynote tomorrow with Tim Cook saying “ah, my bad, Elon doesn’t like it so we’re rolling it back”. And if he blocks Apple devices from Viewing Xitter, they’ll finally move on to other platforms which will potentially cut his user base in half.

  • She looks like she’s under water (what with the fish and octopus) and they are on the same plane as the white outlines and other things in the image, like they’re reflections or clouds.

    Kinda looks like it should be turned clockwise 90 degrees as she’s falling into the water. (You can tell because the way the tips of her hair are further towards the left like she’s sinking)

    I mean, it’s a bit abstract, but there’s no evidence I see for them to be what you seem to be thinking they are.

    Edit: actually it might be that there’s glass on the left like she’s in an aquarium with the fish and such. Again, “white blobs” are reflections.

  • If it’s jamming the drone, it’s probably putting out lots of radio interference… which is a super strong signal the drone should either keep flying on it’s preprogrammed path while firing ordinance to take out the hammer, or just change direction towards the drone jammer. Either way, no more jamming.