

This is Microsoft Licensing in a nutshell.
I have a tinfoil hat theory that they keep it complicated on purpose to add value to 365 certifications


This is Microsoft Licensing in a nutshell.
I have a tinfoil hat theory that they keep it complicated on purpose to add value to 365 certifications
Time to restore a whole machine backup to a VM with no network connectivity, and manually pull the command?


It’s not fear of the freedom, it’s choice paralysis. People want to go to one website, sign up for one account and then be part of a network with absolutely zero research beforehand. I like the fediverse, but the barrier to entry is higher than that because it first requires you to understand the technology at a base level.
Internet services getting shitty and then dying is nothing new. Look at MySpace, Digg, or any BBS. people just abandon the old one and join the new popular one. They’ll leave when it gets shitty enough and join the new thing


It’s bad practice to do it, but it makes it especially easy for end users who already trust both the source and the script.
On the flip side, you can also just download the script from the site without piping it directly to bash if you want to review what it’s going to do before you run it.


My so-called introverted friends never want to go out clubbing on a Tuesday night because they only worry about the future like “Oh, if I go out with you tonight, then I’ll be a zombie at work tomorrow”. Like, live in the now and care about other people, like me!


As a corporate IT drone, usually the extension blocks come from on high and we have no say in what they are. Also, the users that are smart enough to figure out ways around the blocks are not who we are worried about protecting from themselves.


Sometimes you can have a thing that isnt a computer. Sometimes you can just have a glass door. I promise it’s okay.


People have been saying this since he was forced into buying the platform. I initially thought that could be true too.
As time has gone on, however, I’m starting to think he’s just that incompetent


Excel is one of those tools that punches way above its weight class, which is why it’s so common to see in places where it should have been replaced by a proper database years ago.


I’m not sure I necessarily agree. Your assessment is correct, but I don’t really think this situation is security by obscurity. Like most things in computer security, you have to weight the pros and cons to each approach.
Yubico used components that all passed Common Criteria certification and built their product in a read-only configuration to prevent any potential shenanigans with vulnerable firmware updates. This approach almost entirely protects them from supply-chain attacks like what happened with ZX a few months back.
To exploit this vulnerability you need physical access to the device, a ton of expensive equipment, and an incredibly deep knowledge in digital cryptography. This is effectively a non-issue for your average Yubikey user. The people this does affect will be retiring and replacing their Yubikeys with the newest models ASAP.


Absolutely. If you are the CISO in a place where security is a top priority with adversaries that may have access to the equipment and knowledge to exploit this, you will absolutely want to retire the keys ASAP and replace them with the new model that is not vulnerable to this.
NTP is the one that comes to mind for me.
Basically every device uses it and until fairly recently was maintained by a single person


believe it or not, jail.
I tend to just check uptime before asking this question.
If I see the machine has been up for weeks and they tell me they rebooted it, I know i’m dealing with someone who doesn’t know that pressing the power button on the monitor doesn’t turn the computer off.


While many of the CVEs are filed in good faith by responsible researchers and represent credible security vulnerabilities, a recently growing pattern involves newbie security enthusiasts and bug bounty hunters ostensibly “collecting” CVEs to enrich their resume rather than reporting security bugs that constitute real-world, practical impact from exploitation.
Oh, this is once again HR’s fault


How is Photoshop different from Gimp?
Photoshop is a subscription-based graphic design and photo editing program with a large catalog of advanced features that go beyond simple photo retouching. It’s the go-to tool for experienced photographers, graphic designers, web developers, and film editors. But at the same time, its tools are approachable enough for beginners and hobbyists looking to tweak images for work or create artwork in their free time.
Okay cool, that’s all technically true or unverifiable. What makes Gimp different, Adobe?
You dont need to remind us to sympathize with the people you laid off, Phil. Thats the whole reason why your PR is bad right now.


deleted by creator
It really depends on how much you value your time and how good you are with configuration
A QNAP or Synology will work and be pretty simple to configure out of the box. Installing custom software is possible, but can be tricky as they require you to enable sideloading and custom apps can be hard to find. Both have supported app stores with available apps to do what you’re looking for (QNAP has apps for both torrents and Plex. Not sure about Synology)
However, you will get way more bang for your buck by building one from scratch using something like TrueNAS and the Arr stack, but this can require a fair bit of technical knowledge about configuring containers and securing network services(Especially if you want them to be accessible remotely)
Most people here do selfhosting as a hobby and as a result, the time spent trying new configurations is negligible as it wouldn’t be much of a hobby otherwise.