Thanks for the post, super appreciate the posting of other communties. I think this is a great way to grow Lemmy and create discoverability for niche communities, I’ll keep that in mind myself on future opportunities.
Thanks for the post, super appreciate the posting of other communties. I think this is a great way to grow Lemmy and create discoverability for niche communities, I’ll keep that in mind myself on future opportunities.
Wireshark won’t show you anything if it’s encrypted, other then a communication taking place. There’s nothing stopping them from batching or otherwise obfuscating things through all kinds of means.
Exactly the same here too. As a teenager we also all pitched in on a CD burner when they first came out and kept it at the BBS’s owners place, I just remember a single CD took forever back then when it was 1x and 2x recording speed. That allowed us to share a ton more without everyone having to get together on the LAN.
Are you sure you aren’t just seeing the cache? Try cleaning cache, I’m not sure if a close of the app and reload is enough
Thats really interesting. I wonder how much the culture and expectations of norms in corporations makes a difference with this.
Have you worked in several all female crews as well? Its hard to judge when you don’t have a baseline to consider.
This is spot on from my experience as well, you can even see this dynamic play out within individual departments in the same company.
I hear you on the cold part. So many tripped breakers from space heaters… and that one time, a very angry UPS that got plugged into.
Especially in no bug mode, and moreso with infinite ore. Time no longer has any meaning
An acetic does not buy new things again, its more like a permanent state of extreme minimalism.
That’s why there is a huge push now to remedy it. The supply chain shutdown due to covid was the first shot across the bow and now China is massively ramping up its navy to take it. They want to be ready to invade Taiwan by 2027.
Same thing here, but I bought it when winter was coming. I’m nomadic during the warm season so the true test for me will be when that happens.
Or in this case, likely using mom’s electricity without her knowing
Same for me. Only thing that made it permenantly stick.
That could be said of any tool as well, it ultimately comes down to the competence of the person using it, even if that’s a hammer or frying pan.
The attack vectors I’m thinking of just come from the inherent complexity and centralization. I’m just considering the amount of damage that can be done with a compromised DA account for example vs a non directory environment.
It’s complicated. Done right it can be more secure, not done right it’s less secure.
I also only get brought in for problems for the last however many years, so I’m probaby a bit biased at this point haha.
I have had to tell companies they are going to have to rebuild thier AD from scratch because they didn’t know what thier DSRM password was (usually after a ransomware attack). These are the sort of hassles I think about vs non AD.
You could look at freeIPA or something similar to stay on Linux.
I’m an AD specialist, starting when it came out with server 2000, and can tell you it’s a waste of time for a home network unless you are doing this just because you want to learn it.
It will definitly not make your life any easier, and will increase attack vectors, especially if you don’t know how to secure and protect it.
You aren’t your run of the mill AP clerk I’m afraid
The beard and hat make this one hard