Thanks and happy cake day!
Thanks and happy cake day!
eSATA fell out of fashion when USB got faster AND eSATA wasn’t hot plug and play.
People assume that time is a strict progression of cause to effect, but actually from a non-linear, non-subjective viewpoint - it’s more like a big ball of wibbly wobbly… time-y wimey… stuff.
Today I learned there’s a Debian edition of mint.
Thanks!
I was going to reply to this and then decided I don’t care anymore.
Most IT places don’t let end users install software.
He thinks it’ll actually do something.
It will not.
What is the Anti Commercial-Al license and why do people keep adding it to their comments?
“I DO NOT GRANT PERMISSION TO LAW ENFORCEMENT TO READ THIS COMMENT. ANY USE OF THIS COMMENT BY LAW ENFORCEMENT FOR ANY REASON IS ILLEGAL. THIS COMMENT CANNOT BE USED AS EVIDENCE AGAINST ANY NON-LAW ENFORCEMENT PERSONS IN RELATION TO ANY CRIME.”
Got a source on that one? Because the changes they’re (not) making don’t make it seem like they’re bowing down to Google.
What is the Anti Commercial-Al license and why do people keep adding it to their comments?
“I DO NOT GRANT PERMISSION TO LAW ENFORCEMENT TO READ THIS COMMENT. ANY USE OF THIS COMMENT BY LAW ENFORCEMENT FOR ANY REASON IS ILLEGAL. THIS COMMENT CANNOT BE USED AS EVIDENCE AGAINST ANY NON-LAW ENFORCEMENT PERSONS IN RELATION TO ANY CRIME.”
How does the bad guy get to the page?
Then how does he get the user to enter in that code into their mobile device?
Got it.
Now do all 50 US states next.
Then buy them an iPod touch.
No company has any right to force people to use their private phones for company purposes.
Got a reputable source on that one that’s valid for all 50 states?
You have the right not to use your personal hardware for work, and the employer must provide the necessary equipment to accomplish your job.
Reputable Source?
Because you can’t call someone on a hardware token.
One requires the user to go to a bad page and get a spoofed 2FA code so the bad guy can log in.
Do you know how hard that is? Not worth it for 99% of hacks.
The other requires that the user read off their six digit code on their device.
Trivial easy since they already have the user’s password.
People. What a bunch of bastards