Skip Navigation
She'd do the same for me
  • If they can smell and taste better than us, I'm sure water is closer to soda for them with many different flavors. My dog gets breta filled water, but prefers mountain spring water > rain puddle > breta filtered > tap.

  • She'd do the same for me
  • My dog is the pickiest eater I know. The problem I have is that it is never consistent. One day nothing is good enough, another he ignores steak for kibble, the next is a cat food day, then all of a sudden it is time for steak!

    He has the forbidden knowledge that you can crave certain food at the moment, but he has no way to tell be what exactly he wants haha.

  • Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Steak, No peanut butter cracker, Yes kibble

    !

    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    Yes Chicken Quesadilla

    He does eat from time to time.

    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No French Toast
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Sushi and Tempura
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Smoked Ribs
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Steak
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Gyro
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Chicken ala Maria
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Chicken Shawarma and Rice
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Steak and Potatoes
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Bojangles
    0
    20 years in IT, and my career is effectively stuck
  • Computer related fields are a constantly changing tech stack. People either are constantly growing in their career, or they are falling out of date. That long in the field should either be extremely comfortable, issue with the individual, or lack of drive to be constantly challenged.

    The hardest part is the first job. After that should be constant career growth. This observation is only for the US job market.

  • Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Chicken
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Sushi or Vegetable Tempura
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Jersey Mikes Philly Cheese
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Tuna with bonus interested cats
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Assortment
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No Grilled Steak and Mac & Cheese
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No McDonald's
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No quesadilla
    0
    Doggos That Aren't Food Motivated @reddthat.com Stimmed @reddthat.com
    No steak with Mac and cheese
    0
    Are there known vulnerabilities exist on Windows that are not patched?
  • There are literally hundreds to thousands. Many of them are horded by governments, APTs, and pen testers. I personally abused a 10 year old CVE for pen tests that was known to be used by non US government entities for a zero click code execution on opening a word doc.

    Then there are things that are vulnerabilities but cannot be fixed as they are intensic to how Windows functions. Some can be hardened from the defaults but break compatibility and some cannot be fixed without a complete rewrite of how Windows and AD work. Disa stigs will give you defaults that can be hardened. Requirements for all domain users to see all GPOs, users, groups in order for AD to work is an example of something that cannot be fixed without a complete rewrite. That means an in privileged user can get a list of all users, all domain administrator, names of all computers on the domain, etc. As an attacker, that is invaluable.

    Short answer, that list is to big and changes constantly. None that would be comprehensive, but disa stigs is a good place to start.

  • Mastodon thinks Lemmy’s privacy stinks. What say you?
  • If you think anything on the Internet can ever be forgotten... Your going to have a bad time. Passwords, one of the most protected data types, are compiled from beaches into huge databases so that hackers can use them to try to log into website. There are literally dozens of not hundreds of those password databases on the public Internet to be downloaded, not to mention private or dark web collections. If passwords are not safe, what makes you think publicly available social media would be any different?

    Even if somehow the whole federation agreed to purge all post every year, things like the Internet archive and Google cache of pages would retain the data.

  • any jerboa users have any luck un-blurring nsfw posts by default?
  • I believe the setting is allowed by instance default instead of user setting in the app. It also fails to blur user avatars in nsfw posts viewed with blur enabled which results in porn being showed from the user avatars, even when the post its self is blurred.

  • how free do you think we will we be to talk about piracy here, compared to reddit?
  • There are many variables that makes a yes no answer impossible. Currently there are too many instances for a lawsuit to be brought to each. The instances are in different countries, do different laws would have to be navigated for each. For example, in the US, Google has like to piracy websites. Google doesn't allow housing of piracy on their platform. Google does some removal of listings but it is but exhaustive.

    Google is not being held liable, and I bet if an instance happens to cache piracy content due to a user interacting with another insurance, Google and ISPs would be interested in helping that instance so president isn't set that creates liability for traffic that happens to traverse servers, if it is but being served by the server.

    This is a very ELI5, and isn't a full discussion of all the variables. A difficult question even limited to one country's laws.

    Realistically, the while point of a federation us to make it impossible to shut down, or censor world wide, the community as there are simply too many different servers. This works against corporate attacks as well as legal.

  • how free do you think we will we be to talk about piracy here, compared to reddit?
  • It will likely depend on how popular Lemmy becomes as well as the server physical location \ DNS registry that of used.

    Having a piracy channel on an instance located in a country that does not recognize intellectual property, and a DNS registration in a TLD that doesn't respond to piracy complaints should be pretty bullet proof. Only thing that companies could do at that point would be to try to get a court order to have the DNS entry blocked by US \ EU \ etc DNS providers, or a court order for ISPs blocking the server IP address. These could be easily circumvented by changing the server IP if it happens and updating the DNS.

  • Comment sorting
  • Apologies, appears I was misremembering. I can only find it for posts, not comments. The website allows sorting comments, but I would imagine it will be added to the app.

    I'm sure there are hundreds of feature requests ATM :)

  • What are YOU self-hosting?
  • For best practice, my personal recommendation would be to not have any service public facing besides a VPN that requires MFA. segment self hosted services into separate VLANs based on how sensitive the content is. Disallow all traffic between VLANs unless required and only allow based on port number, specific resources needed. Don't forgot to disable outgoing Internet access unless required. Devices like Chinese made video cameras should never have an Internet connection.

    My network looks something like: home vlan, work vlan, Netflix \ hulu streaming devices, cctv, wireless work, wireless home, wireless guest, iot, servers, network management. Would be way overkill for vast majority of people, but I would be hypocritical not to considering what I do and I do have a different threat profile than most.

    Another thought: self hosted through VPN with MFA and nothing public facing is probably safer than cloud as long as you have cold backups.

  • What are YOU self-hosting?
  • It was meant more as a joke than criticizing hosting your own services. I personally have a VPN with MFA, and services that I host for my self that are segmented to a paranoid level (home camera system on own vlan, restricted from being able to reach any other vlan or the Internet, etc) with a deny all and explicit allows on per host and traffic type. The amount of work that went into building the network is probably overkill, and it is still susceptible to nation state and supply chain compromise but hopefully whoever gets in will curse me if they try to move around the network.

    Realistically, every added service and host is added attack surface and chances for misconfiguration \ supply chain attack, but being alive is a risk too....

    I'm guessing system admins and dev op is over represented here so some of our home networks may be targeted as a path into a corporate environment, but I'm guessing the chances are low. Sadly even the most secure networks are not an impossible target. The attackers are well ahead of defenders of networks. Attackers need exceptions, while defenders need everything perfect. Much harder to accomplish.

  • Preferred Vendors
  • Depends on the load, budget for capex and opex, and what the network will be running :)

    I liked HP procurve before the Aruba firmware was introduced. For wireless, I used to like Ruckus 5 years ago. Cannot stand the move to cloud management that all the WAP vendors seem to require.

    For auth, the click verify of duo is pretty nice if the security of a physical OTP device isn't needed.

    For firewalls.... ASA if NSA isn't in the threat profile.

  • Setting up certs for inward facing services
  • It is always good practice to set up certificates everywhere. I do it for all of my internal services. Each person has a different level of care for how important privacy and security are and some people have abnormal threat profiles.

    With that being said, options are usually to run self signed certificates, roll your own certificate authority for your network, or get valid certificates from a service like letsencrypt.

  • InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)ST
    Stimmed @reddthat.com
    Posts 52
    Comments 20