I used to read a lot of books. And while not coming straight out and say this person is white or whatever I got that the characters where just like me and I think that is what all authors want without saying it straight out. The purpose of a book or story is to let the reader decide. Woke just reminds me of the new Jim Crow laws cry.
Is he planning to also use the laptop as a laptop?
If not, there are small form factor PCs (especially if you’re willing to buy used business stuff) that don’t take up a lot of space that can be good options. Laptops have some features that are kind of nice on a server as well (the battery becomes a backup against power outages and you don’t need to remote access or plug stuff in to use it because it has a built in display and keyboard), but I don’t think they’re so nice that it’s usually worth buying a laptop just for that purpose. It’s more a reason that repurposing an old one makes sense. If you’re willing to pay the premium a new laptop adds, you can get some pretty low profile units.
with a $1000 budget they might want to consider building a computer as desktops usually provide better performance/per cost rather than buying a $1000 laptop
desktop pcs can also be small if a small form-factor like ITX or mini-ITX is chosen (although mini-ITX can be pricey)
building is incredibly easy as there’s a plethora of tutorial vids online and you’re less likely to get screwed over by an Original Equipment Manufacturer (OEM) or retailer
diy vs. buying a pre-built
the fediverse here also has an active community for support !buildapc
Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn’t work well for people on different instances. Try fixing it like this: !buildapc
The one caveat to building is if you build a PC and a single component is faulty, you are now responsible for determining which component is to get the RMA done. That can be a big hassle. One time for me it was actually two different components that needed to be replaced by the manufacturers, and that was a pain to figure out.
that is definitely true however the added benefit is typically a longer warranty range as buying a laptop would typically mean that all components would be sold under a single flat warranty cycle/deadline
plus even if your computer is borked, you can still take it into a microcenter, memoryexpress, brick-and-mortor retailer to have their technicians figure it out the problem for a cost
I have these kinds of typical IT consulting discussions as a time vs. cost tradeoff that the user will have to decide once they’re informed on the basics
Maybe 10 or so years ago, was a real push to convert old malls into apartments or low income housing. Turns out it’s not that easy. Those buildings were built with minimal plumbing, just a few public restrooms and limited water service for the food court. There’s just not enough water/sewer to supply more than a small handful of apartments. You’d have to tear up significant portions of the building to run all new plumbing for all the kitchens & bathrooms. And that assumes the underlying city infrastructure that runs to the mall could even support the new water & sewage demands in the first place.
I’ll grant you, it is a cool idea. It’s just not nearly as simple as it sounds.
It is actually safe to ignore them. It means either someone has an email address similar to yours, or a bot of some sort has you email address and only your email address.
Essentially, someone or something goes to the login screen, enters your login, and says “I don’t have the password, let me in!”.
Sending a code to your email like this is the first step in letting someone in without the password, or more specifically to having them reset it.
Since the email is to check “did you ask for this?”, doing nothing tells them that you did not.
If you want some extra peace of mind: account.live.com/Activity should show you any recent login activity which you can use to confirm that no one has gotten in.
Also, use two factor, a password manager, and keep your recovery codes somewhere safe. The usual security person mantra. :)
This is all good information and seems well intentioned, but it’s worth pointing out in a post about account security that clicking links provided by others and giving it your login information is very unwise (even/especially links in emails like these). For the link you provided, it’d be better to recommend going through a primary microsoft page or login that can be confirmed by the user and getting to the activity history page from there
That is wonderful advice and I’m glad you pointed that out. :)
If I knew how to give directions to the page, I would, but unfortunately I don’t know the Microsoft site layout, only the URL that their help center directed to.
In mitigation of my indiscretion: it’s generally safer to trust a person you approach out of nowhere than to trust someone who approaches you out of nowhere.
Since they chose the venue and asked the question, the likelihood that an attacker is present in the replies is lower than the expectation that an unsolicited email is from an attacker.
But it’s also entirely correct to be distrustful of anything anyone asks you to click on, triply so if it involves security or login pages.
People freak out when you point out their yew bush is super poisonous.
Like, I’m the bad guy for knowing that it only takes like 50 grams of leaves to kill a person and their is no antidote.
If it keeps happening, prefers middle of the night (to where you live) hours, and you often get a really big batch in a row, then yes, it’s probably an attempted hack.
In any case, I would making sure your password is strong and isn’t reused anywhere else, and set up multi factor authentication.
kbin.life
Oldest