I’m a technical kinda guy, doing technical kinda stuff.

  • 0 Posts
  • 25 Comments
Joined 9 months ago
cake
Cake day: September 27th, 2023

help-circle

  • Did they give you a very funny reason for this requirement, or is it just some windows exclusive garbage that doesn’t work in wine?

    Why do people always ask this kind of crap?

    If you have a corporate laptop, it will likely have a suite of software centrally managed by your company’s IT department.

    It will contain software that is also centrally licenced so that your boss doesn’t have to figure out how to pay for thousands of dollars of software, they can just tell IT to bill a licence for software X to your cost centre at $13.75 a month.

    It will have a domain login that is your corporate identity which will usually require multi factor authentication.

    It will have some corporate VPN solution which operates mostly transparently and requires zero setup on your part.

    It will contain company sensitive data which will usually be encrypted by bitlocker, whose keys are stored with your domain account.

    It will have the usual Teams/Outlook/SharePoint stuff with a centralised calendar and contacts for your company, and likely security classifications for all the communications you do through it, allowing you to join groups, accept invites to restricted groups, and limit access, all linked to your domain account.

    It will have mapped drives to your corporate file storage , again, all linked to your domain account.

    It will probably have OneDrive, synced to a corporate server, again, linked to your domain account.

    It will have a printing solution that is linked to your domain account so that your printers follow you wherever you go and you can easily find and print to the secure print queue on some random printer you happen to walk past in one of your offices, so you can enter your PIN or swipe your access card and have that IMPORTANT_SECRET_RESEARCH.DOC file print while you’re standing in front of the printer.

    And finally, your work laptop does not belong to you. Wiping it and installing Linux plus Wine and keeping company sensitive data on an unmanaged device will attract the ire of HR.

    Your IT department won’t give a crap. But they also won’t help if anything doesn’t work, such as trying to join a domain to access allllll those domain-linked features with an unauthorised device.

    They will simply re-image your laptop to bring it back to a known state that they can deal with, because they are dealing with thousands of devices. They need everything to be homogeneous simply because they don’t have the manpower to manage anything else or to audit a million different configurations for security issues or data leaks.

    So no, suggesting Linux + Wine to run some “windows exclusive garbage” isn’t an answer here.


  • Precisely.

    A 1200 watt microwave is essentially like a 1200 watt bar heater if you’re outside the oven cavity. To a person, it will feel pretty warm at a distance of a few feet as the energy is basically unfocused as it exits through the open door.

    But to a drone, it’s 1200 watts of RF noise near a receiving device that’s tuned to listen for signals that are typically around 0.00000001 watts. It would be like trying to hear a pin drop at a rock concert.

    Do need to make sure you point it upwards though as it will cause havoc with microwave motion sensors and a bunch of other sensitive listening stuff. Also, good luck getting wifi within a hundred metres of it.



  • The bug is the lack of documentation and that a simple unguarded command can erase all user’s data on the system.

    Also, the principle of least surprise would like a word.

    If I look at the command line arguments of a program called “systemd-tmpfiles” and one of them is called “purge” I will generally assume that option will purge temporary files.

    Now it turns out that someone decided that this program would be a simple way to do something with /home directories(*) so they included /home in the config file for the program, the file that the program reads by default when it is invoked.

    Who decided it would be a good idea for it to deal with /home?

    Wellllll…

    https://github.com/systemd/systemd/blob/main/tmpfiles.d/home.conf

    (*)I have no idea what this program is doing with /home in its config file. I will presume that there is a useful and mostly logical reason for it, and that this command line option was just an unfortunate footgun for those users who were not intimately familiar with systemd.



  • And how if you share a file in Teams and then six months later you want to share a file with the same name to ANYONE else via teams, well that’s a big no-can-do. Teams just went ahead and uploaded that file to your “stuff to share” folder in OneDrive and didn’t put it in a subfolder unique to the chat, or add a unique prefix or suffix or anything because hey, you’ll only ever share a file with a particular name once in your life, right?

    And nobody would ever want to share a file with the same name, but different data, right? So Teams can just give the end user the choice between replacing the current file with the new one, or sharing the same one again to these new guys, because there’s no possible use case for actually having two files named the same with different information in the file, right?

    Nobody would want to share a README.TXT, or Photo001.jpg, or contact.ics, or a zip file of a folder they just downloaded from Teams’ SharePoint interface, the file that’s automatically called “OneDrive.zip” without the option to change it before saving, more than once, right? Right??

    Fuck teams. And fuck Teams(New) too, just for the shitty name.



  • I hate how bloated the kernel is. I’d like it to fit into main memory.

    Take a copy of lspci, lsusb. Use them to build a kernel from source with only the bits you need and then make the bits you might need modules. Include your filesystem driver into the kernel and you can skip the usual initramfs stage and jump straight to your root filesystem.

    Might take a few tries, but at least it doesn’t take 18 hours to compile the kernel anymore…


  • You need silicon.

    The earth’s crust is about 25 percent silicon. Sand made out of quartz like desert sand is about 50 percent silicon. Beach sand is usually mainly calcium carbonate from shells and it doesn’t contain much silicon at all. Volcanic beach sand is more likely the same as the earth’s crust so 25-50 percent.

    So as long as you refine your sand/gravel/rocks/lava so that you’re left with pretty much pure silicon, you’re good to go.





  • i like how the answers are the exact same generic unhelpful drivel you hear 20k times a month if you’re…

    Searching for a solution to any problem on the internet.

    There are a million ad- laden sites that, in answer to a technical question about your PC, suggest that you run antivirus, system file checker, oh and then just format and reinstall your operating system. That is also 90 percent of the answers coming from “Microsoft volunteer support engineers” on Microsoft’s own support forums as well, just please like and upvote their answer if it helps you.

    There are a million Instagram and tiktok videos showing obvious trivial, shitty, solutions to everyday problems as if they are revealing the secrets of the universe while they’re glueing bottle tops and scraps of car tires together to make a television remote holder.

    There are a trillion posts on Reddit from trolls and shitheads just doing it for teh lulz and Google is happily slurping this entire torrent of shit down and trying to regurgitate it as advice with no human oversight.

    I reckon their search business has about two years left at this rate before the general public regards them as a joke.

    Edit: and the shittification of the internet has all been Google’s doing. The need for sites to get higher up in Google’s PageRank™ or be forever invisible has absolutely ruined it. The torrent of garbage now needed to ensure that various algorithms favour your content has fucked it for everyone. Good job, Google.


  • I work in OT. The number of “best practice” IT mantras that companies mindlessly pick up and then slavishly follow to the detriment of their mainly-OT business is alarming.

    Make your own damn best practice that suits your business best, don’t copy and paste something from a megacorp. Sure, include elements from megacorp’s best practice if they are applicable, but don’t be a slave to the entirety of it.




  • LIVE BLACKBIRDS???

    Sing a song of sixpence a pocket full of rye,

    Four and twenty blackbirds baked in a pie.

    When the pie was opened the birds began to sing,

    Oh wasn’t that a dainty dish to set before the king?

    The king was in his counting house counting out his money,

    The queen was in the parlour eating bread and honey

    The maid was in the garden hanging out the clothes,

    When down came a blackbird and pecked off her nose!

    Moral of the story, don’t be a minor character in an 18th century nursery rhyme.


  • Yes, I shifted to my own domain after my default ISP of 20 years decided that email was just too hard, you know? They didn’t outright say it, they just started batch processing emails so that I’d get all my daily emails at around 2 am the next day. Super handy for time limited password reset emails!

    A few hours reading a guide and setting up a $5/mo linode email server with SPF and dmarc, a few more hours transferring 20 years of IMAP mail from my old account to a folder, and a month or so of changing a few site contact emails over each day when they emailed something to my old account, and now I’ve got an email server on my own domain that is 10 times faster at sending/receiving mail than my old ISP ever was.

    And now I can have amazon@mydomain.com and career@mydomain.com and random other disposable addresses so that when they are inevitably sold off for the $$$ I can just dump them and maintain a spam free inbox.


  • You’re thinking of a firewall. NAT is just the thing that makes a connection appear to come from…

    That connection only “appears to come from” if I explicitly put a rule in my NAT table directing it to my computer behind the router doing the NAT-ing.

    Otherwise all connections through NAT are started from internal->external network requests and the state table in NAT keeps track of which internal IP is talking to which external IP and directs traffic as necessary.

    So OP is correct, it does apply a measure of security. Port scanning someone behind NAT isn’t possible, you just end up port scanning their crappy NAT router provided by their ISP unless they have specifically opened up some ports and directed them to their internal IP address.

    Compare this to IPV6 where you get a slice of the public address space to place your devices in and they are all directly addressable. In that case your crappy ISP router also is a “proper” firewall. Strangely enough it usually is a “stateful” firewall with default deny-all rules that tracks network connections and looks and performs almost exactly like the NAT version, just without address translation.