

Your comment seems like a rational response to me.
Your comment seems like a rational response to me.
After you boil them, is mashing them preferable? Or does that ruin the whole thing?
I thought this was an onion article.
Pop! Os
Imo.
Printers. Desk phones. Wmi service crashing at full core lock under the guise of svchost.
I spent like 20 minutes self hosting and running over tailscale so traffic is always private… Never had an issue. I’ve got over 20 devices accessible on it.
Easy to remote register over ssh just by sending the installer plus running with server name plus key, then setting a static password.
I still think gaming wide moonlight is great though. You won’t really regret that.
I bet to Japanese people it’ll age weirdly with the references it kept making to politicians and actors of the time.
I really enjoyed it when it wasn’t trying to be a shonen jump anime. My favourite episodes like the Nabe Shogun bottle episode, or the several lazy animator episodes either with the drawing quality rock bottom or the paralysis with no animation at all.
I used to watch it on a service called something like animeftw or something that’s no longer around on an xbox xbmc setup. So much nostalgia when I see screen caps.
Hmm, so, policy in our office is a clean desk. Before you jump to conclusions, it’s because our secured area and office occasionally has people come through that should absolutely not see what information we have on our desks. This requirement is a compliance issue for our continued contracts and certifications.
Our work from home policy hasn’t addressed this issue, but it sounds like it’s a clear gap. Your neighbour coming around for a cup of tea absolutely should not be able to see any work related information.
My assumption is that someone has considered this kind of aspect and had a check to confirm that they’ve done diligence by asking you to reveal your working space. A space the companies sensitive information would be visible. Actually you too should maybe not be looking at your wife’s screen nor materials on her work desk. Depending on the situation.
Either way, policy comes first so perhaps her employment agreement or employee handbook would reveal more.
Ah yep that makes sense though I’m following now
Oh okay, I see… Or rather, I see I don’t understand lol
Wait so, if your kettle fails, your fridge loses power for example?
For me I want to know how much frame latency there is since I’m suspicious and I want to try things to see the effect and I just don’t know how to get that information in an OSD like I can with msi afterburner.
If someone knows what can do this in Linux, please reply!
Instead I just stopped all competitive and cooperative gaming. Which is a bit of a shame. Sometimes I’ll load up windows to join friends but usually by the time I’ve updated whatever game I’ve gotten over it.
Don’t get me wrong, hiccups aside I’m very happy which is why I’m in Linux most of the time. But it’s not always a wonderful world.
That would surely only power a single circuit (due to isolation) and if you have to be selective, a critical circuit like your fridge isn’t really likely to have a wall port on the same circuit near where you’d happily have your fume emitting generator…
I’m no electrician but I’ve generally installed automatic transfer switches (ATS) for mine site server cabinets that then power UPS racks and the transfer switch automatically or manually can switch from mains to generator if mains power goes out (which at a mine is all the time). I feel like a similar and safe system must exist for homes. Or something no different to switching solar to grid and back.
But again, not an electrician.
A software shouldn’t use passwords for tls, just like before you use submit your bank password your network connection to the site has been validated and encrypted by the public key your client is using to talk to the bank server, and the bank private key to decrypt it.
The rest of the hygiene is still up for grabs for sure, IT security is built on layers. Even if one is broken it shouldn’t lead to a failure overall. If it does, go add more layers.
To answer about something like a WiFi pineapple: those man in the middle attacks are thwarted by TLS. The moment an invalid certificate is offered, since the man in the middle should and can not know the private key (something that isn’t used as whimsically as a password, and is validated by a trusted root authority).
If an attacker has a private key, your systems already have failed. You should immediately revoke it. You publish your revokation. Invalidating it. But even that would be egregious. You’ve already let someone into the vault, they already have the crown jewels. The POS system doesn’t even need to be accessed.
So no matter what, the WiFi is irrelevant in a setup.
Being suspicious because of it though, I could understand. It’s not a smoking gun, but you’d maybe look deeper out if suspicion.
Note I’m not security operations, I’m solutions and systems administrations. A Sec Ops would probably agree more with you than I do.
I consider things from a Swiss cheese model, and rely on 4+ layers of protection against most understood threat vendors. A failure of any one is minor non-compliance in my mind, a deep priority 3. Into the queue, but there’s no rush. And given a public WiFi is basically the same as a compromised WiFi, or a 5g carrier network, a POS solution should be built with strengths to handle that by default. And then security layered on top (mfa, conditional access policies, PKI/TLS, Mdm, endpoint health policies, TPM and validation++++)
Seems like you should submit a change request with your fixes?
Transport layer security should mean this shouldn’t matter. A good POS shouldn’t rely on a secure network, the security should already be built in cyptographically at the network session layer. Anything else would still have the same risk vector, just a lower chance of happening.
In fact many POS systems happily just take a 4g/5g sim card because it doesn’t matter what network they’re on.
Hate to break it to you, but most IT Managers don’t care about crowdstrike: they’re forced to choose some kind of EDR to complete audits. But yes things like crowdstrike, huntress, sentinelone, even Microsoft Defender all run on Linux too.
Well, what I really wonder is if because the kernel can include it, if this will make an install more agnostic. Like literally pull my disk out of a gaming nvidia machine, and plug it into my AMD machine with full working graphics. If so this is good for me since I use a usb-c nvme ssd for my os to boot from on my work and home machines and laptops for when I’m not worrying. All three currently have nvidia cards and this works ok. I have some games to chill and take a break. My works core OS for work MDM etc unmodified. I like it that way.
I realise this is not a terribly useful case, but I could see it for graphically optimised VM migrations too not that I have many. Less work in transitioning gives greater flexibility.
This is more autism than adhd and it’s a huge value of autistic people to reflect a “normal” attitude as absurdity.