/usr used to be the user home directory on Unix…well most of them. I think Solaris/SunOS has always been /export/home as I recall.
/usr used to be the user home directory on Unix…well most of them. I think Solaris/SunOS has always been /export/home as I recall.
Yeah good point. I’m definitely guilty of looking at it through an NA centric lens on my post. Thanks for the perspective.
I doubt this happened because of busses that’d leave or parents wondering where the hell their kids are while they are waiting.
I doubt a private school would put up with a consistent disruptive student or with a teacher losing control of a class so bad that they keep everyone behind while also having to deal with angry paying parents.
It’s possible but I doubt it’d happen more than once with that teacher.
You need SPF, DKIM, DMARC with a RUA set up to an email that doesn’t bounce. That’s pretty much it. I’ve been running email servers a long time and actually set up email from a new domain/IP a couple of years ago as well.
This is true. If you have DMARC and your RUA set up (with a working email (or one that doesn’t bounce at least)) along with SPF and DKIM, Google and MS will accept your mail. The only time it won’t at that point is if your IP is in the same /24 as a known spammer but so long as the spam stops, you’ll fall off the list. Some of the common spamlists allow you to request your IP be removed by request and I can only recall one list that almost nobody uses that makes you pay for the removal though there may be more I don’t recall.
THEY DON’T EVEN HAVE ARMS!
Confirmed, VeggieTales is anti-2A.
I’m sure laws on this differ everywhere in the world but I assume you’re talking US. It is doubtful an employer could win a law suit against you for not showing your specific methodology unless you have a contract and that was part of it.
As far as firing goes, there aren’t very many situations that an employer can’t fire you over for cause but obviously also can fire you without cause.
Would they own the templates? Yeah but they’d also have to know to look for them unless you told them. Otherwise they’d probably already have created some templates and expect you to use and perhaps improve them.
Reminds me of a friend of mine. He was promoted to some sort of engineering metrics analyst. His job it turned out, was to take a bunch of different reporting products and then create a presentation once a week to go over all of the metrics and have them in easy to understand graphs on a specific template.
So of course a month into the job he automates the entire thing and his job now takes a total of 5 minutes because he waits on the actual numbers to be crunched and spit out into the new template.
He’s super bored and asks me if he should tell his boss what he’s done and possibly get another promotion out of it. I said “Sure, if you want to be promoted to the layoff line.”
So his boss gave him some extra tasks and he just keeps blazing through them. His boss wants to know how he’s able to be the most productive person they’ve ever seen in that position. He asks me again, if he should tell the boss and his boss’ boss because they are super impressed. I said “No. Absolutely not. Just shrug and tell them you just do your best every day. They’ll eat that right up.” He does. He gets a promotion a couple of months later to a middle manager of some type. Probably due the Peter Principle.
Don’t ever give out your templates or show your process. If they can hire someone less experienced at a much cheaper rate, they eventually will.
Here’s how to delete the SBAT policy that the Windows Update applies.
It updates Secure Boot in the BIOS, so you could completely remove Windows but the Secure Boot update would still be in the BIOS and affect the boot loader.
I did some digging and it seems like the family’s suit should actually be against the pub that was renting the in-park space from Disney. It’s just unfortunate that the prevalence of corporate propaganda in news media
He is suing both Disney and the pub. The pub obviously because they were negligent and Disney because it is in Disney World. It is up to the court to decide how much liability Disney should have vs. the pub, if any.
I doubt Disney would be able to successfully argue that just because the restaurant is leasing space in Disney World that they have zero liability but that’s up to the court.
Then you have your starter meat and can start the age old tradition of passing it down from generation to generation so that they can keep making You Steaks forever.
“My great-great grandpa/ma sure is delicious!”
There are a couple of OEMs like System76 and Starlabs that sell laptops with Linux on them, provide tech support for customers and so on.
And no, installing most distros aren’t hard. You just click the buttons to proceed and fill out the username and password box, select your time zone and select your wi-fi network if you’re using wifi.
You can do manual partitioning but why would you if you don’t know what you’re doing?
Installing software in the GUI is as easy as installing software from the Microsoft Store. Just search or look around and when you see something you want, just click the Install button.
I get the sentiment but defense in depth is a methodology to live by in IT and auto updating via the Internet is not a good risk to take in general. For example, should Crowdstrike just disappear one day, your entire infrastructure shouldn’t be at enormous risk nor should critical services. Even if it’s your anti-virus, a virus or ransomware shouldn’t be able to easily propagate through the enterprise. If it did, then it is doubtful something like Crowdstrike is going to be able to update and suddenly reverse course. If it can then you’re just lucky that the ransomware that made it through didn’t do anything in defense of itself (disconnecting from the network, blocking CIDRs like Crowdsource’s update servers, blocking processes, whatever) and frankly you can still update those clients anyway from your own AV update server which is a product you’d be using if you aren’t allowing updates from the Internet in order to roll them out in dev first, phasing and/or schedules from your own infrastructure.
Crowdstrike is just another lesson in that.
What I usually do is set next boot to BIOS so I have time to get into the console and do whatever.
Also instead of using a browser, I prefer to connect vmware Workstation to vCenter so all the consoles insta open in their own tabs in the workspace.
Having a NAT on a consumer router is indeed the norm. I don’t even see how you could say it is not.
I never said NAT = security. As a matter of fact, I even said
It was not designed for security but coincidentally blah blah
But hey, strawmanning didn’t stop your original comment to me either, so why stop there?
Let me tell you: All. Modern. Routers. include a stateful firewall.
I never even implied the opposite.
To Linux at least, NAT is just a special kind of firewall rule called masquerade.
Right, because masquerade is NAT…specifically Source NAT.
I’m just going to go ahead an unsubscribe from this conversation.
So, really, you were “correcting” me for you and your specific setup at the very beginning because your router’s firewall has a deny rule for all inbound connections because I must have been confusing what a NAT and what a firewall is because I must have been talking about your specific configuration on your specific devices.
Holy. Fucking. Shit.
Are you saying that everyone’s router’s firewall drops all packets from connections that originate from outside of their network?
Because, as I said:
layer 7 firewalls for the network which are going to be where most the majority of attacks are concentrated.
The NAT doesn’t have to operate at layer 7 to be effective for this because
coincidentally it is doing the heavy lifting for home network security because it is dropping packets from connections originating from outside the network, barring of course, forwarded ports and DMZ hosts because the router has no idea where to route them.
The point is that the SPI firewalls are not protecting against the majority of the attacks we’ve seen for decades now from botnets and other arbitrary sources of attacks, except, perhaps targeted DDoSing which isn’t the big problems for most home networks. They must worry about having their OS’ and software exploited and owned in the background, which doesn’t get much of an assist from a router’s firewall.
Obviously, this is however true for the NAT since the NAT are going to drop connections originating from outside the network attempting to communicate with that software to exploit it
barring of course, forwarded ports and DMZ hosts because the router has no idea where to route them.
They won’t because there is an old sewer main that runs underneath and according to the town is prohibitively expensive to reconcile all of that with the bridge lowering.
The rail line won’t increase the height anymore because then it will cause a hump in the train tracks there.