Never underestimate how lazy and soulless corporations can be. Unionize, or keep getting treated like shit.
Never underestimate how lazy and soulless corporations can be. Unionize, or keep getting treated like shit.
Hey now Kirkland brand is respectable, usually premium brands repackaged. Such as how Costco vodka was secretly (“secretly”) Grey Goose
Ohhhhh it was this extra ’
Hardest interview I ever had was a job where I worked the least. Second-most lucrative.
I used to use this setup for pen testing
Used to. Why no longer?
I’m just gonna say it: fuckYourCamelCase
Most countries give customs and border agents broad latitude to do stuff like that. I’ve had it happen in Vietnam, the US, and Turkey, among others.
Burners, all the way
You’re driving home in the rain. A deer jumps out and you managed to hit the brakes but still hit it, albeit having slow down to 10km or less. Slow enough that the deer is able to get up and runaway, but still enough to dent your car and crack a windshield. Any blood or hair gets washed away in the rain. Car runs well enough to get you home.
10 min behind you there is a hit and run and pedestrian is killed by a vehicle that drives off. No camera footage, no solid proof of who did it.
Eventually you come to a big intersection where there is a camera and it records your dented, cracked car rolling through 20-30 min after they estimate the pedestrian got hit. Ruh roh.
So you get charged with hit and run and manslaughter. There isn’t a ton of ways to prove it’s not you, even though it’s clearly not. So your options are plead Guilty and get fucked, or roll the dice with Not Guilty, probably lose, and get fucked extra hard.
Alfred plea is basically hey I can’t prove it but I also won’t admit guilt. Prosecutors know they can’t prove, specifically, it’s you, but also can’t rule you out, so people cut a deal.
Antivirus as a thing is mostly dead, or has morphed into more aggressive endpoint protection. In that sense ClamAV is mostly to scan for known malware in things like mail servers. Make sure people aren’t sending malicious stuff, albeit mostly low hanging fruit.
Nextcloud, wikis, or other similar aggregation sites are also a usecase, but again low hanging fruit.
Set up a cron job and have it run periodically, like once an hour / day / week, whatever. Make sure you set up something that alerts you if/when it hits on something.
My father in law was a commercial pilot and he had a home server just to keep photos and travel writing while he was flying and away from home a lot. I helped him upgrade some of that to the cloud, since that makes for sense when on the other side of the country, but he still has a bunch of stuff at home.
If they get root or admin they can hack the chip itself.
But minor exploits, nada, no issue, you good. Gotta get root to make it happen.
Problem is if you, as they say, get got, you have no way of knowing if they’re in your CPU, and no way to fix if they did – basically gotta trash it and replace.
Nah just rename everything related to Perl
Looks like a usb, and a molex power connector. You’d have to break out a multimeter to figure out what’s active and what’s a ground though, and then have to bit bang your way to figure out what each connection does.
related: https://en.wikipedia.org/wiki/Some_Thoughts_on_the_Science_of_Onanism
by Mark Twain, btw. short read, and hilarious
Nah. No changes to labor costs, except they might have gone up slightly since now our offshore teams are Cloud Support and can charge 1.50/hr more.
No processes go any faster and some are arguably slower
Still safer than zx
Huh doesn’t require enterprise subscription to see that solution
Separate subsets, segregated traffic. Easy to avoid crosstalk by setting channels further apart or using 2.4ghz and 5ghz
At home I have one SSID as a main wifi, and the other is guest wifi and IoT or other random devices.
Main downside is getting it setup and maintenance.
to paraphrase hl mencken: ask and ye shall receive – and receive it good and hard
Sounds like a great use case for getting an AI to do the interview for you – bots talking to bots