While I’m not 100% certain it’s not just confusing perspective, it does appear that the slope rise is shorter than the run, suggesting that this is from the top of the stairs.
- 1 Post
- 110 Comments
IHawkMike@lemmy.worldto Showerthoughts@lemmy.world•If all the people throughout history would have said to themselves: "It is what it is", then we 'd all still be living in grass huts and caves.131·2 months agoHard disagree. It only applies for things you cannot change but should try to accept rather than stressing over it.
If you say “it is what it is,” in reference to things you could change but choose not to, well that’s on you.
IHawkMike@lemmy.worldto Sync for Lemmy@lemmy.world•Have you reported issues to the developer?English11·2 months agoSame here. No issues.
Device information
Sync version: v24.03.26-14:56
Sync flavor: googlePlay
IHawkMike@lemmy.worldto Selfhosted@lemmy.world•Setting up a private network in shared apartmentEnglish2·3 months agoThe easiest way that doesn’t affect the main network would be to use a travel router. Its WAN IP would be the private IP it gets from the main network (over wireless since that’s your only option). And it would NAT your network onto that IP and then you can do whatever you want on your network.
I’m not sure if that Mikrotik router will do this but it might. You basically need something that can connect to an SSID and use that interface as its WAN interface. The wireless factor here is really limiting your choices. If you had a wired uplink to the main network you could use any router/gateway/firewall you wanted. You could also use an AP in bridge mode to connect to the main network’s SSID and wire it to the WAN port of any router of your choice.
You don’t really need to use VLANs to separate your network from the main network unless you want to share any of the same layer 2 segments (basically wired Ethernet) while keeping it isolated. But it doesn’t really sound like that applies in your scenario. Of course using VLANs within your network would still make sense if that applies (for example, to separate your server traffic from your IoT traffic).
IHawkMike@lemmy.worldto No Stupid Questions@lemmy.world•What kind of CAPTCHA is this?128·3 months agoDefinitely malware, as everyone has already said.
IHawkMike@lemmy.worldto Technology@lemmy.world•HP ditches 15-minute wait time policy due to 'feedback'English9·5 months agoI don’t deal with hardware much anymore, but I’d take Aruba over Cisco any day. But for everything else, yeah fuck HP.
IHawkMike@lemmy.worldto No Stupid Questions@lemmy.world•Isn't it possible to frame almost any opinion as a question?12·5 months agoI’m Ron Burgundy?
IHawkMike@lemmy.worldto Selfhosted@lemmy.world•Looking for personal cloud storage alternativesEnglish8·5 months agoYep that’s how I have Syncthing set up. All global and local discovery disabled, no firewall ports open on the clients, no broadcasting, no relay servers. Just syncing through a central server which maintains versioning and where the backups run. Works like a charm.
As another poster mentioned, QubesOS with anti evil maid will work, but that’s the defense against state actors too and is overkill for this threat model.
BitLocker or any FDE using SecureBoot and PCR 7 will be sufficient for this (with Linux you also need PCRs 8+9 to protect against grub and initramfs attacks). Even if they can replace something in the boot chain with something trusted, it’ll change PCR 7 and you’d be prompted to unlock with a recovery key (don’t blindly enter it without verifying the boot chain and knowing why you’re being prompted).
With Secure Boot alone, the malicious bootloader would still need to be trusted (something like BlackLotus).
Also make sure you have a strong BIOS password and disable boot from USB, PXE, and anything else that isn’t the specific EFI bootloader used by your OS(es).
I will never understand how anyone could come to thinking aspic was a good idea.
IHawkMike@lemmy.worldto Selfhosted@lemmy.world•WebDAV on Windows 11 - HTTPS Not Working & Sync Issues (Local Network Only)English2·6 months agoNot that it’s my first recommendation for security reasons, and I would never do this in prod, but you can just add the self-signed cert to the local trusted root CA store and it should work fine. No reg changes needed.
If you do this, put it in the store of the user running the client, not LocalMachine. Then you just need to make sure you connect as something in the cert’s SAN list. An IP might work (don’t know since I never try to put IPs in the SAN list), but just use a hosts entry if you can’t modify local DNS.
Edit: after reading the full OP post (sorry), I don’t think it’s necessarily the self-signed cert. If the browser is connecting with https:// and presenting a basic auth prompt, then https is working. It almost sounds like there is a 301/302 redirect back to http after login. Check the Network tab of the browser’s dev pane (F12) to see what is going on.
I’m guessing most of the younger crowd here has never seen When Harry Met Sally.
IHawkMike@lemmy.worldto Asklemmy@lemmy.ml•What is the legitimate use-case for generative AI?3·6 months agoI use it for providing a text summary of YouTube videos that I can parse quickly. Because everything has to be a gorram video these days.
Probably the 9950x3d. And we’ve known for a while now that the cache would only be on one CCD.
IHawkMike@lemmy.worldto Technology@lemmy.world•Asus bombards Windows 11 with christmas.exe malware-like Christmas wreath bannerEnglish71·7 months agoLinux on enterprise user endpoints is an insane proposition for most organizations.
You clearly have no experience managing thousands of endpoints securely.
Yeah, that too.