Well if you say so, I defer to your higher authority on bullshit.
Well if you say so, I defer to your higher authority on bullshit.
Not cheers, no. But it increased my problem-solving reputation within the company and it made Linux more appealing to key people in the company.
What’s wrong with that? What’s your butthurt? Are you bitter about something?
Not cheers, no. But it increased my problem-solving reputation within the company and it made Linux more appealing to key people in the company.
What’s wrong with that? What’s your butthurt? Are you bitter about something?
Well I’m sure they have very good reason and I’m not questioning them. I’m just talking from a user’s standpoint (and I’m a very poor Windows users): whenever I try to port any of our tools to Windows, wham the damn antivirus kicks in and puts my stuff in quarantine. If I use an engineering application that talks to some device on an unusual port - and I’m talking outgoing traffic, not incoming, wham it’s blocked. And unblocking it requires making a formal request to IT, that whitelists the application, until WithSecure updates itself and forgets about it, and here we go again.
It’s just a complete PITA. You constantly feel like you’re fighting an algorithm with stupidity built in just to get normal, honest-to-goodness work done.
Well I’m sure they have very good reason and I’m not questioning them. I’m just talking from a user’s standpoint (and I’m a very poor Windows users): whenever I try to port any of our tools to Windows, wham the damn antivirus kicks in and puts my stuff in quarantine. If I use an engineering application that talks to some device on an unusual port - and I’m talking outgoing traffic, not incoming, wham it’s blocked. And unblocking it requires making a formal request to IT, that whitelists the application, until WithSecure updates itself and forgets about it, and here we go again.
It’s just a complete PITA. You constantly feel like you’re fighting an algorithm with stupidity built in just to get normal, honest-to-goodness work done.
It’s whatever works for you.
Me, depending on the type of file, I either have a more or less full description (so I can find things with find and English words) and/or some sort of short coding system that makes sense for a given type of file. After using the same codes for a long time, I know exactly what they mean.
For example, I would name an ebook “823-sf-rah-The_moon_is_a_harsh_mistress.epub”: that way I can look it up by DDC number (823), genre (SF), author if they’re well known (Robert A. Heinlein) and of course the title of the book, or any combination thereof. That’s my own system for ebooks.
For music, I make one directory per album or record named artist-comma-name (e.g. “Al_Di_Meola,Orange_and_Blue”) and the individual tracks inside as e.g. “track01-Paradisio.mp3”, “track02-Chilean_Pipe_Song.mp3”… The reason I only do one directory deep per album instead of, say, author/album/tracks is because most MP3 players back in the days, and most music apps today, understand that way of organizing music. That’s my own system for music.
Etc etc. Just make up your own system that works for you. Just stick to characters that are acceptable in all OSes’ filesystems so you can move your stuff around without problems, and avoid spaces so it’s not a pain to type.
mv?
Honestly, just prefix or suffix the filename. I’ve been cataloging all my stuff like that for the past 30 years - including, for things like music, the track number, which the filesystem and every portable device under the sun will naturally sort and play in the correct order. Finding things can be done with regular filesystem tools like, well, find. And it will work exactly the same way in all OSes that have a concept of filesystem.
mv?
Honestly, just prefix or suffix the filename. I’ve been cataloging all my stuff like that for the past 30 years - including, for things like music, the track number, which the filesystem and every portable device under the sun will naturally sort and play in the correct order. Finding things can be done with regular filesystem tools like, well, find. And it will work exactly the same way in all OSes that have a concept of filesystem.
Password are routinely stolen, then bought and sold on hackers’ marketplaces. That’s how.
2FA is great. It’s the best tool there is against impersonation and account takeovers.
But it’s only great PROVIDED
SMS is fine for 2FA, as long as you can’t use it for anything else
Oh yeah? Post your bank customer number and your telephone number on here and see how fast your account gets drained without you even getting a single confirmation code SMS.
It’s been known for years that SMS-based 2FA is terrible, terrible security. The sites that use them have no interest in their users’ accounts’ security: all they’re interested in is harvesting their phone numbers.
It’s been known for years that SMS-based 2FA is terrible, terrible security. The sites that use them have no interest in their users’ accounts’ security: all they’re interested in is harvesting their phone numbers.
Funny you should ask: I installed Debian 32-bit on an old Asus Eee PC netbook yesterday to breathe new life into that old machine and turn it into a controller for a piece of test equipment we have at work. My company keeps old stuff like that around until space is needed in case someone needs something.
Just in case I had to modify something in the tester’s control software, I figured I’d install i3wm and Vim. It didn’t take long and I was surprised by how usable the machine ended up being. Honestly I wouldn’t have minded using it as a bone fide laptop for light-duty work on the go.
So basically keep your expectations low and install super-lightweight software, and your old Aspire could live a few extra productive years instead of going to the landfill.
It’s a problem if you need a fucking banking app for example, and the bank won’t let you sideload it and you’re running a deGoogled OS. Then you suddenly need a backup phone with the full surveillance Android just to do banking.
I trust my kids to mostly only use the devices how I say. The security is mainly to keep their mum happy
It sounds like you should simply trust your kids and convince your better half that she should do the same.
If there’s one thing I learned both as a kid and as a father, it’s that restricting kids’ access to computers - or anything really - just doesn’t work: software solutions that exist for that purpose are almost always defeated by kids, who are reliably more clever than the adults who try to restrict them, and only exist to falsely reassure their parents.
If you’re serious about controlling your children’s cellphones, I’d suggest buying them Linux phones, or phones that you can install a mobile Linux distro on: nobody makes Linux apps, so good luck getting malware or shitty social media apps on them. And of course, you can keep the root password to yourself and set up your kids as non-privileged users.
Either that or feature phones - if you truly hate your children.
deleted by creator
deleted by creator
Well if you say so, I defer to your higher authority on bullshit.