Not cheers, no. But it increased my problem-solving reputation within the company and it made Linux more appealing to key people in the company.
What’s wrong with that? What’s your butthurt? Are you bitter about something?
Not cheers, no. But it increased my problem-solving reputation within the company and it made Linux more appealing to key people in the company.
What’s wrong with that? What’s your butthurt? Are you bitter about something?
Well I’m sure they have very good reason and I’m not questioning them. I’m just talking from a user’s standpoint (and I’m a very poor Windows users): whenever I try to port any of our tools to Windows, wham the damn antivirus kicks in and puts my stuff in quarantine. If I use an engineering application that talks to some device on an unusual port - and I’m talking outgoing traffic, not incoming, wham it’s blocked. And unblocking it requires making a formal request to IT, that whitelists the application, until WithSecure updates itself and forgets about it, and here we go again.
It’s just a complete PITA. You constantly feel like you’re fighting an algorithm with stupidity built in just to get normal, honest-to-goodness work done.
It’s whatever works for you.
Me, depending on the type of file, I either have a more or less full description (so I can find things with find and English words) and/or some sort of short coding system that makes sense for a given type of file. After using the same codes for a long time, I know exactly what they mean.
For example, I would name an ebook “823-sf-rah-The_moon_is_a_harsh_mistress.epub”: that way I can look it up by DDC number (823), genre (SF), author if they’re well known (Robert A. Heinlein) and of course the title of the book, or any combination thereof. That’s my own system for ebooks.
For music, I make one directory per album or record named artist-comma-name (e.g. “Al_Di_Meola,Orange_and_Blue”) and the individual tracks inside as e.g. “track01-Paradisio.mp3”, “track02-Chilean_Pipe_Song.mp3”… The reason I only do one directory deep per album instead of, say, author/album/tracks is because most MP3 players back in the days, and most music apps today, understand that way of organizing music. That’s my own system for music.
Etc etc. Just make up your own system that works for you. Just stick to characters that are acceptable in all OSes’ filesystems so you can move your stuff around without problems, and avoid spaces so it’s not a pain to type.
mv?
Honestly, just prefix or suffix the filename. I’ve been cataloging all my stuff like that for the past 30 years - including, for things like music, the track number, which the filesystem and every portable device under the sun will naturally sort and play in the correct order. Finding things can be done with regular filesystem tools like, well, find. And it will work exactly the same way in all OSes that have a concept of filesystem.
Password are routinely stolen, then bought and sold on hackers’ marketplaces. That’s how.
2FA is great. It’s the best tool there is against impersonation and account takeovers.
But it’s only great PROVIDED
SMS is fine for 2FA, as long as you can’t use it for anything else
Oh yeah? Post your bank customer number and your telephone number on here and see how fast your account gets drained without you even getting a single confirmation code SMS.
Define normal…
If you go by the definition of being the most common thing, the current surveillance capitalist dystopia is literally the new normal.
What you mean is that you feel it shouldn’t be normal. And you’re right. But sadly, it is now undeniably the norm.
It’s been known for years that SMS-based 2FA is terrible, terrible security. The sites that use them have no interest in their users’ accounts’ security: all they’re interested in is harvesting their phone numbers.
The TOR network itself is safe - at least assuming the TLAs don’t control at least half of the nodes, which is far from impossible. But let’s assume…
The weak point comes from the browser: that’s how the fuzz deanonymizes users. The only safe browser to use on TOR is the TOR browser, and that’s the problem: it disables so many unsafe functionalities that it’s essentially unusable on a lot of websites. So people use regular browsers over TOR, the browser leaks identifying data and that’s how they get caught.
Funny you should ask: I installed Debian 32-bit on an old Asus Eee PC netbook yesterday to breathe new life into that old machine and turn it into a controller for a piece of test equipment we have at work. My company keeps old stuff like that around until space is needed in case someone needs something.
Just in case I had to modify something in the tester’s control software, I figured I’d install i3wm and Vim. It didn’t take long and I was surprised by how usable the machine ended up being. Honestly I wouldn’t have minded using it as a bone fide laptop for light-duty work on the go.
So basically keep your expectations low and install super-lightweight software, and your old Aspire could live a few extra productive years instead of going to the landfill.
Here’s a little story that shows how much society has become dystopian:
Back in the 90’s, I worked in France for a while. When I was there, a case was brought up against the state that had violated a CNIL rule: some dude was cheating on his taxes by claiming he lived at some address. Tthe French fiscal administration sued him because they obtained a file from the electricity company and another from the water utilty company showing that the consumption of both electricity and water were so low it wasn’t consistent with the dude actually living there.
The case was thrown out, the dude walked and the state was fined because it had violated a rule that clearly stipulated cross-referencing files for the purpose of extracting secondary information that wasn’t available in each single file was a violation of privacy and civil liberties.
I shit you not. This used to be a thing.
Can you imagine this today? All the Big Data sonsabitches cross-reference billions of files ALL THE TIME and nobody bats an eyelid anymore.
If you’re old enough, you remember sovereign states taking privacy seriously. If you’re not, you don’t. And that’s how Big Data gets away with what they do today because fewer and fewer people remember a time when it was unacceptable.
Eventually we’ll hit big brother levels.
As someone who was born before the age of surveillance capitalism, I can tell you we’ve hit that level a long time ago. Anybody who thinks society has been running normally for at least the past 15 years is too young to have known what a normal society is.
To evade taxes of course.
Have you ever asked yourself how it’s possible that ALL the fucking ultra-rich almost without exception do philanthropy?
It doesn’t make sense: most of those millionaires and billionaires are psychopaths who essentially don’t give a shit about their fellow man, acquired their wealth by exploiting and shafting others for the most part, and don’t give a shit about how that makes them look: why on Earth would any of them do philanthropy, let alone all of them?
It only starts to make sense when you understand philanthropy is yet another tax loophole.
I would suggest we give him the 3,000 acres of Lana’i he doesn’t own, so the entire island belongs to him, then strand him there forever.
I have been hating this man’s guts since the mid 90’s and somehow it never lets off. Most hateful people manage to become a little bit more likeable as they age. Even this disgusting piece of human refuse Bill Gates might pass for a somewhat okay human being if you wilfully overlook why he truly does philanthropy.
But Larry Ellison? Hell no. He never changes. he’s just consistently the worst year after year, decade after decade.
What if you don’t want a Pixel? Or a Fairphone? Or one of the very, VERY few cellphones that you can install a deGoogled OS on?
There are precious few ways of escaping the Google monopoly. I own a Fairphone running CalyxOS, and it happens to be the phone I want because of its excellent repairability. So lucky me. But if I didn’t want a Fairphone, nor any Samsung phone, nor any Chinese cellphone, and certainly not a fucking Google phone - because I’d rather cut off my left nut than give Google money to escape Google’s surveillance, that’s just too rich for me - then I’d be SOL.
My point is, if you refuse to be Google’s bitch, Google backs you into a corner. Just because you’re happy with the corner doesn’t mean you’re not stuck in a corner.
Google “might let me” do something…
If that doesn’t summarize everything that’s wrong with this fucking monopolist, that controls YOUR device that you paid with YOUR money but ultimately isn’t yours to do as you please, I don’t know what does.
The only thing that makes Google a bit tolerable in the mobile space is Apple, because Apple is even worse. At least you can (still) sideload stuff in Android - although Google is about to make that impossible very soon too.
Fuck the monopolists.
Runbox, a privacy-focused email provider out of Norway. Our family has been using it for years with zero issues. The prices are very decent.
Well if you say so, I defer to your higher authority on bullshit.