Where do I fit if I use all three?
Where do I fit if I use all three?
lol you are correct. I meant to reply to the other guy. Low on sleep like many of us here
This happened because a file that CrowdStrike pushed out, which by their own processes is not one that is signed, was immediately pushed out with one of their updates. This update was pushed directly through CrowdStrike’s own method, not via Windows Update. CrowdStrike maintains this capability in order to quickly respond to and prevent security threats. The fact that they have .sys files that aren’t signed is crazy on its own, and a huge screwup by CrowdStrike. So many companies relied upon and trusted this company because up until now, everybody considered it a great product, so it was extremely popular and prevalent. It’s been a huge wake up call for everybody in I.T.
deleted by creator
Maybe a rogue entity trying to anonymously use it to train an AI or LLM. Either for its data or to learn how to more effectively attack.
“My boss says I need something called ‘Wind Skip.’ I don’t know what it’s for; I have a PDF here with instructions. He says we can just download it and run it, but I couldn’t find it. Can you install it for me?”
Orcas are smart. This article suggests it’s not intentional and maybe out of curiosity? Whatever. They figured out how to sink boats without ramming full speed. How much you wanna bet they’re pillaging the sunken ships for food and drinks and stuff. Special little treats that sailboats happen to carry. Or maybe they get pissed off when one of them dumps their lavatory waste or something.
I work in I.T. for a healthcare company. Ascension is a pretty large one. The bigger a company gets and the faster it grows, the more it takes on a diversity of varying technologies that all need to be managed, migrated, killed off, merged, hardened, etc. It’s a difficult job especially for healthcare. I know that the company I work for is working very hard to keep up with things, but it’s a logistical nightmare. You MUST have very smart people in charge that have the right priorities. You have to have information channels open to make sure administration knows what the potential issues are. Compartmentalization of information and access. There are so many potential points of failure it’s insane. And then there’s the most important thing of all: making sure all employees are educated enough that they don’t let their credentials get compromised.
Things are getting worse in general because of how hard it is to stay on top of everything nowadays. I just recently got a couple of letters in the mail about my info being leaked by some companies that had my info. I just have to do my part to stay on top of my own responsibilities, watch my own identity and finances, and make sure those around me are being secure, as well. Everybody needs to know how important this is, and many do, but I don’t think enough people really understand or make it a priority.
HHS is instituting new rules for healthcare (and other industries) to help track and respond to these things. The government is getting very involved with this now. I hope it helps.
Is this blog yours?
I’ve never understood that one. I understand even less now that I’ve written a Powershell script for remote troubleshooting at work. It started simple, but now it gathers tons of information, a lot of which is from the logs. On some machines it takes literal seconds to search and pull all of the log information. I could run this script probably 15 times in the time it takes to even launch Event Viewer.
We use Dell WD-19 docks. Not sure if you use similar. Updated dock firmware and laptop drivers made a difference for us with connection issues. Sometimes you gotta perform a reset on them to make them behave (disconnect dock power and USB-C and hold power button for just over 15 sec). Sometimes the laptop NVRAM needs to be reset instead (for Dell, disconnect all devices and power while off and hold button for just over 30 sec). Overall, though, no huge issues with DP specifically if the dock and laptop firmwares are up to date. Third-party docks/replicators definitely have way more issues, though.
Oh, there’s no way Elon wants a machine with a company image on it.
He probably bought a Win11 S-mode laptop, not knowing what that was.
As many companies now use Bitlocker encryption, you’ll probably Bitlock your work partition by trying to install the second drive internally. IF YOU MUST boot to another drive, keep it external. And DO NOT unlock or mount your work partition in your personal OS. Really, though, you shouldn’t do this at all.
deleted by creator
My first thought was also that it’s a Pi bottleneck. I have a 4b, and I don’t think I would really trust it to handle some of the higher-quality streaming. Maybe just barely.