Exactly! It’s not like you need them to learn good habits to become self-sufficient workers when they grow up.
As much as we beg and plead him, our dog is never going out to get a job. Might as well spoil him with treats and belly rubs!
Exactly! It’s not like you need them to learn good habits to become self-sufficient workers when they grow up.
As much as we beg and plead him, our dog is never going out to get a job. Might as well spoil him with treats and belly rubs!
This isn’t Microsoft’s announcement. They announced over a month ago. This also only affects bulk senders sending over 5,000 emails a day inbound to their Hotmail/Outlook.com service.
And if you can’t send DMARC-compliant emails in 2025, frankly you deserve to be blocked.
You clearly know more than me, but wouldn’t everything from 4GB to 1TB have the same number of walks? And one more walk gets you up to 256TB?
No that’s not how it works. Handling a larger address space (e.g., 32-bit vs 64-bit) maybe could affect speed between same sized modules on a very old CPU but I’m not sure that’s even the case by any noticeable margin.
The RA in RAM stands for random access; there is no seeking necessary.
Technically at a very low level size probably affects speed, but not to any degree you’d notice. RAM speed is actually positively correlated with size, but that’s more because newer memory modules are both generally both bigger and faster.
Hard disagree. It only applies for things you cannot change but should try to accept rather than stressing over it.
If you say “it is what it is,” in reference to things you could change but choose not to, well that’s on you.
Yep this is exactly right. Too many people are unaware that their votes are not anonymous on Lemmy and blocking the public tool only helps the bad guys who already know this. I’ve always thought this was a major weakness in Lemmy but I don’t have a solution myself without some other major drawback.
I think probably votes should be anonymized or batched between servers so that only your instance’s admins can see individual votes and you just have to trust the instances you federate with that they aren’t pulling any shenanigans or otherwise defederate. That’s not an easy problem to solve, but it’s not like it’s not currently possible to manipulate votes with a federated server, it would just be harder to detect. Regardless I think the need for privacy wins here.
The easiest way that doesn’t affect the main network would be to use a travel router. Its WAN IP would be the private IP it gets from the main network (over wireless since that’s your only option). And it would NAT your network onto that IP and then you can do whatever you want on your network.
I’m not sure if that Mikrotik router will do this but it might. You basically need something that can connect to an SSID and use that interface as its WAN interface. The wireless factor here is really limiting your choices. If you had a wired uplink to the main network you could use any router/gateway/firewall you wanted. You could also use an AP in bridge mode to connect to the main network’s SSID and wire it to the WAN port of any router of your choice.
You don’t really need to use VLANs to separate your network from the main network unless you want to share any of the same layer 2 segments (basically wired Ethernet) while keeping it isolated. But it doesn’t really sound like that applies in your scenario. Of course using VLANs within your network would still make sense if that applies (for example, to separate your server traffic from your IoT traffic).
Definitely malware, as everyone has already said.
They’re only killing the crappy store/UWP version that nobody used anyway and only caused confusion. The normal OneNote bundled in Office isn’t going anywhere as far as I know.
That said, I’ve moved a lot of my note taking to Obsidian. It’s not a perfect replacement but it’s a fantastic markdown editor and now I use both for different use cases.
The Kuva Bramma in Warframe. Just rains cluster bombs.
I heavily use both and this is objectively untrue.
This is a good answer.
To add, for Linux kernels, the maintainer use a shim EFI package with the distro’s keys (e.g., Canonical’s keys for Ubuntu) which loads the maintainer-signed kernel. And Microsoft signs the shim to keep the chain intact.
I don’t deal with hardware much anymore, but I’d take Aruba over Cisco any day. But for everything else, yeah fuck HP.
I’m Ron Burgundy?
Nothing you said is wrong, in fact it’s all good advice. But none of what you listed implicitly provides protection against ransomware either.
For that you need backups that are immutable. That is, even you as the admin cannot alter, encrypt, or delete them because your threat model should assume full admin account compromise. There are several onprem solutions for it and most of the cloud providers offer immutable storage now too.
And at the very least, remove AD SSO from your backup software admin portals (and hypervisors); make your admins use a password safe.
What you should be worried about more than a keylogger is that most 2.4 GHz wireless keyboards can have the keystrokes sniffed through the air. Bluetooth will be encrypted though.
“To read the purported PDF document, victims are persuaded to click a URL containing a list of steps to register their Windows system. The registration link urges them to launch PowerShell as an administrator and copy/paste the displayed code snippet into the terminal, and execute it.”
This is not new, nor is it newsworthy.
Lol Microsoft is not even close to a walled garden. This is just them removing the password manager feature that nobody used from their authenticator app.