And here I am blown away by the screenshots and want to wishlist it, only to see I already had it on my wishlist and remember NOTHING about seeing this previously.
And here I am blown away by the screenshots and want to wishlist it, only to see I already had it on my wishlist and remember NOTHING about seeing this previously.
Yep, instant sync is never a guarantee. There still has to be a queue for command messages along with authentication plus authorization of said commands. And just like you said, you must be connected to a network that then can reach their cloud to even receive the command queue.
I run a sync service between multiple Active Directory domains as a result of a merger and the directories haven’t been cutover yet. Along with this sync is a password sync that is normally instant. Most of the times (> 90%), less than a second. Sometimes 3 seconds. Other times? 2 minutes. Even when things are within the same LAN, there’s the possibility of a backed up queue.
So yeah, this is purely on him trusting the sync implicitly and not verifying. In my case, I trust it too but will on occasion have to assist users because it’s not infallible. Karma got him and I have zero sympathy.
They may actually have fixed it now. Worked all day yesterday for me but it just redirects to the profile URL now for me too.
The funny thing is, it’s not actually hidden if you know how to see them. Just throw “/likes” after a profile. They only hid the fucking button.
*Babbages’s’
When the only choices are parkour or menus? Yes.
800-53 Rev 5 is such a pain in the ass to implement fully but holy shit is it much needed. Bad actors out there everywhere and if followed to the letter, those controls will save you almost every step of the way. “Almost” because there will always be a new method to infiltrate an organization or agency, but the damage control built into these controls should lessen the impact regardless.
A friend told me about it shutting down last night and I looked into it. Found a thread 2 or 3 months old on Reddit talking about it shutting down, though I hadn’t heard about it myself. So maybe this isn’t quite so sudden but the news wasn’t exactly broadcasted widely.
Only thing surprising is that it took this long for it to happen. Everyone else knew that there would be immediate forks made but seems they took a month to catch up to speed with the internet.
Their marketing dept is probably concerned.
Uhhhhh yes? Correct?
Because no one addressed it yet, you won’t be able to use Game Pass at all on Linux (unless you’re using the streaming service). There’s no way of making that work currently, and may never be a way. But for most everyone else? Most things just work out of the gate with no tweaking. But for things that don’t, use https://protondb.com
Btw, I use Arf.
Lol oh I never said it’s a good solution. The worst part isn’t running IIS, it’s running IIS on a domain controller. The better option is using a different domain for AD than your web domain, as long as it’s a publicly registered domain for certificate purposes.
Hilariously, I bet it’s because their Active Directory domain is the same as their public domain, and it becomes a massive pain in the ass to hostname the root domain. Yes, externally you can do it just fine, but then it’s not consistent internally on their private network.
One solution is you run IIS (or any other web server) purely as a permanent redirect for the internal host, but it would then need to run on each domain controller which brings its own set of issues.
I can from personal experience that there is a huge push to get much more secure in the local government space in the US, including adhering to NIST 800-53, and be audited on it. It’s not foolproof, but it’s a much needed step forward towards preventing big events becoming breaches. But if they are a breach they’ll be lower impact. It’s painful to get there, but I’ve been involved heavily in the conversion in policies and procedures to get there.
I wouldn’t say that Windows is malware itself, but rather it wasn’t created with a security-first stance, which we absolutely need for all OSes going forward. I say this as someone who ditched Windows as my DD (“I use Arch, btw”). I left Windows more for their policies and subscription models that are becoming increasingly anti-consumer.
With that said, let’s not pretend that Linux is immune as has been proven in the past week with xz and liblzma being compromised. Yes, it took 3 years to get to the point their long game paid off, but it still happened through a series of credibility social engineering steps by a single person. (Yes I know others were also trying to do exactly this, but only Jia Tan was successful)
Can confirm that acme.sh is a great option. Way better support of many DNS APIs than Certbot, including easier setup of wildcard certificates. Personally moved to this when Certbot’s ability to do RFC2136 (dynamic DNS method that many DNS servers support) was seriously lacking, and never looked back.
You really need to tell Mom to stop spamming you.