fun fact: If you ever see any of those quirky “solve this complex equation for the Wifi password” It’s always either the phone number of the place, or the first X digits of Pi.
fun fact: If you ever see any of those quirky “solve this complex equation for the Wifi password” It’s always either the phone number of the place, or the first X digits of Pi.
They were pretty astonished when they heard that she had installed a GPU by herself (which most people here know is trivial). Which gave her enough confidence to fix her VCR by herself.
Anyone can learn any skill if they actually invest the time.
And regarding the older brother, you learn pretty quickly working help desk that users generally don’t care what the problem is or why it happened. They just want to get back to work and not have it happen again. After a while you get conditioned to just be friendly and solve the issue without explaining what you’re doing or why.
They did back when that was the windows logo.
Well of course it errors out, you’re using powershell rather than DOS
If looks dont matter, I’ll recommend the same thing I always do when people want an air purifier.
Look into making a Corsi Rosenthal Box. They’re surprisingly effective, and dirt cheap.
This sounds fucking incredible, and I will be trying this as soon as I have avocados again.
My favorite single moment so far was the conclusion of the battle between Luffy and Boa Sandersonia.
It really highlights that Luffy is not willing to act against his principles, even if it would further his goals.
Best arc though is a tossup between Arlong Park or Impel Down. Arlong Park has had the best character writing in the series so far, and Impel Down has the highest stakes.
I’m currently going through the One Piece manga for the first time and I’m having a blast.
I’m in the middle of Punk Hazard right now and it’s starting to drag on, but I’m told that everything gets way better afterwards.
I’m not sure I necessarily agree. Your assessment is correct, but I don’t really think this situation is security by obscurity. Like most things in computer security, you have to weight the pros and cons to each approach.
Yubico used components that all passed Common Criteria certification and built their product in a read-only configuration to prevent any potential shenanigans with vulnerable firmware updates. This approach almost entirely protects them from supply-chain attacks like what happened with ZX a few months back.
To exploit this vulnerability you need physical access to the device, a ton of expensive equipment, and an incredibly deep knowledge in digital cryptography. This is effectively a non-issue for your average Yubikey user. The people this does affect will be retiring and replacing their Yubikeys with the newest models ASAP.
Absolutely. If you are the CISO in a place where security is a top priority with adversaries that may have access to the equipment and knowledge to exploit this, you will absolutely want to retire the keys ASAP and replace them with the new model that is not vulnerable to this.
This started happening to me more and more after I hit my 30s, and it stopped happening once I started taking a daily multivitamin.
This game is awful
My certs have all expired, but when I started I didnt have any at all.
The thing that worked for me was to apply to small businesses(Look into local MSPs). Places that have ~20 employees have much less rigor about certs and will more likely test that you’re amicable enough to mesh with the rest of the team. From there you can build experience and often get thr company to pay for your certs.
Not at all.
Unsolicited email is spam. It’s as simple as that. Dont feel bad about flagging them as such if they won’t respect your contact preferences.
They very likely dont have read or write access to the files on your device.
However, they probably do have the ability to remotely wipe the device. This feature is typically used in enterprise if a phone or laptop is lost or stolen to prevent bad actors from getting access to the data stored on the device.
Not only does password rotation not add to security, it actually reduces it.
Assuming a perfect world where users are using long randomly generated strong passwords it’s a good idea and can increase security. However, humans are involved and it just means users change their passwords from “Charlie1” to “Charlie2” and it makes their passwords even easier to guess. Especially if you know how often the passwords change and roughly when someone was hired.
Ideally, your users just use a password manager and don’t know any of their credentials except for the one to access that password manager.
If they need to manually type them in, password length should be prioritized over almost any other condition. A full sentence makes a great unique password with tons of entropy that is easy to remember and hard to guess.
I get this too. However, you’ll usually be able to tell the professionals your end goal during the quoting process and if your requirements are reasonable, they’ll work with you.
If they won’t do that, then you get to ask yourself the next question:
If not, then you can just refuse the quote and work with someone else.
More often than not, the professionals know what they’re doing and will be able to work around your requirements, and if they can’t, they’ll have competitors that can.
This would be a double edged sword. Without regulation, the ISP will work in whichever way grants them the most money.
This means that they probably won’t go after copyright claims unless the rightsholders pay them first, but they will ramp up data collection efforts to sell to brokerage firms and will also engage in rate-limiting on high-bandwith use cases like streaming or torrenting unless you pay extra.