There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

kbin.life

aclarkc , to piracy in Funimation setting for yt-dlp to backup your digital copies

This is a great post. I don’t personally need it but I love to see these sorts of teaching/sharing posts especially when companies make these sorts of decisions.

mister_newbie , to piracy in Best website for downloading a pirated copy of Windows?

Just download it from MS directly and use it unactivated (select “I don’t have a key” when prompted). Why anyone would f- around with their OS, of all things…

If you care to activate, it’s trivial to get a grey key or to find an activation script (though I think they patched out the script – even though MS Support themselves used it)

cuntonabike ,

Or just use ohook

massgrave.dev/ohook.html

Used this about 4 times in the past month alone lol

hurtn ,

This is the way

CraigeryTheKid ,

That looks like for Office? Not Windows?

cuntonabike ,

It’s both

BearOfaTime ,

There’s also Tiny10/Tiny11 on Archive.org.

I use it in VM’s for testing.

CrayonRosary ,

How can you ever trust something like that?

Resol ,
@Resol@lemmy.world avatar

That’s why they’re using a VM.

kylian0087 ,

Google massgravel

beatle , to linux in Are there any studies done on how much linux can save governments money if they do a whole migration?

Microsoft are deep into the government with exchange and Active Directory with most being migrated to Microsoft365 and Azure.

Add in MS Teams, SharePoint, MS SQL, 30 years of business rules living in old excel macros that ends up running the entire company.

Windows enterprise licences would be a tiny part of their spend and far too costly to mitigate away from. Most large corporations are virtualising old windows version just to keep their existing legacy apps runnings.

bulwark ,

Totally agree on Microsoft having a vested interest with being the US Gov main software provider and the spend a lot to keep it that way

Rhynoplaz , to nostupidquestions in How does ransomware get into major networks, such as schools or other large public agencies?

It doesn’t matter how strong your defenses are and how skilled your IT team is, when fucking Linda in accounting opens EVERY SINGLE GODDAMN ATTACHMENT SHE GETS!!!

Oisteink ,

She’s had poor training I guess. SEBKAC! Security exists between keyboard and chair

AnneBonny ,

Security exists between keyboard and chair

In theory

FuglyDuck ,
@FuglyDuck@lemmy.world avatar

Theory doesn’t match reality.

PEBKAC is reality.

Rhynoplaz ,

Linda has a standing desk. Checkmate, hackers!

Cinner Bot ,

SEBSAC (security exists between shoes and computer, or socks and computer, or soles and computer, or sprostherics and computer, or smagic carpet and computer)

Caligvla ,
@Caligvla@lemmy.dbzer0.com avatar

Jokes on you she doesn’t have legs or arms for that matter.

Cinner Bot ,

Anybody and anyhead can ride a magic carpet, they don’t discriminate.

lightnsfw ,

Some people aren’t trainable.

joyjoy ,

Then the IT department sends everyone a Honeypot email and schedules more training and a meeting with a manager for anyone who clicks any links in the email.

noUsernamesLef7 ,

It is a great step but it’s rare to have enough buy in from upper managent to enforce any real consequences for repeat offenders. I’ve seen good initial results from this kind of phishing testing, but the repeat offenders never seem to change their habits and your click rate quickly plateaus.

kersploosh , to nostupidquestions in How do we know the universe outside our solar system truly exists?
@kersploosh@sh.itjust.works avatar

It’s the same way you know the things outside your window are real. You look at the light coming to you from that object and make inferences as best you can. As long as new observations and inferences line up with old observations and inferences, then you can be reasonably confident that your growing model of the outside world is accurate. When something doesn’t add up then you revise your model and keep iterating with new observations.

There’s no difference whether the object appears to be within our solar system or far outside it. We see something and we interpret what we can from the available observations. Occasionally, if something is close enough and interesting enough, we send a robot to orbit the thing or maybe land on it and gather better observations, like how Rosetta/Philae visited a passing comet.

TGhost , to linux in [QUESTION] I installed Apache OpenOffice
@TGhost@lemmy.dbzer0.com avatar

I downloaded Java, Removed LibreOffice, and installed OpenOffice.

Why ? O.O
pls tell us,
Dont bother with openoffice, go back libreoffice ^^"

DeadNinja , to showerthoughts in A 3d printer is basically just a really fancy hot glue gun
@DeadNinja@lemmy.world avatar

Btw our heads are very slowly 3-D printing our hairs…

sxan ,
@sxan@midwest.social avatar

Also, our fingers are printing fingernails.

MxM111 ,

Maybe 2D is more accurate description.

Perfide ,

Hair is three dimensional.

sus ,

So is printer paper and printer ink

MxM111 ,

But the hair printer is not. It can’t make changes in third dimension.

crazyminner ,

1D would actually be the most accurate, if we were going by movement.

fubbernuckin ,

I think hair is a 1d printer process.

hperrin ,

Just wait until you find out what your ass does.

Burninator05 ,

Soft serve ice cream machine?

GrayBackgroundMusic ,

Only if you’re a unicorn. youtu.be/YbYWhdLO43Q

DeadNinja ,
@DeadNinja@lemmy.world avatar

I hate you…/s

waz ,

s/ice/hot/g

1boiledpotato , to piracy in Recent Nebula content

I understand pirating from Netflix and such, cause they’re big companies and their service is shit, but Nebula is run by creators and you support them directly with a subscription. So if you have $5 at your disposal I would highly encourage paying for Nebula.

hperrin , to piracy in Recent Nebula content

Sign up, watch videos, cancel account. Or look for pirated versions, but Nebula is one of the places that has yet to turn shitty.

TheGalacticVoid ,

Plus it’s hard to believe that it will since it’s creator owned and the creators who own it mostly have integrity.

Dave , to selfhosted in What's wrong with using cloudflared?
@Dave@lemmy.nz avatar

I think concerns come in two flavours:

  1. Privacy/security: Cloudflare terminates HTTPS, which means they decrypt your data on their side (e.g. browser to cloudflare section) then re-encrypt for the second part (cloudflare to server). They can therefore read your traffic, including passwords. Depending on your threat model, this might be a concern or it might not. A counterpoint is that Cloudflare helps protect your service from bad actors, so it could be seen to increase security.
  2. Cloudflare is centralised. The sidebar of this community states “A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.”, and Cloudflare is for sure a service you don’t control, and arguably you’re locked into it if you can’t access your stuff without it. Some people think Coudflare goes against the ethos of self-hosting.

With that said, you’ll find several large lemmy instances (and many small ones) use cloudflare. While you’ll easily find people against its use, you’ll find many more people in the self-hosted community using it because it’s (typically) free and it works. If you want to use it, and you’re ok with the above, then go ahead.

Nibodhika ,

There’s a third point which is: Things in CloudFlare are publicly accessible, so if you don’t put a service on front for authentication and the service you’re exposing has no authentication, a weak password or a security issue, you’re exposing your server directly to the internet and bad actors can easily find it.

Which is why some services that I don’t want to have complicated passwords are only exposed via Tailscale, so only people inside the VPN can access them.

lemmyvore ,

In addition to the above, most of the percieved advantages of CF are non-existent on the free tier that most people use. Their “DDoS protection” just means they’ll drop your tunnel like a hot potato, and their “attack mitigation” on the free tier is a low-effort web app firewall (WAF) that you can replace with a much better and fully customizable self-hosted version.

Dave ,
@Dave@lemmy.nz avatar

They explicitly use free DDoS protection as a way to get you in the door, and upsell you on other things. Have you seen them “drop your tunnel like a hot potato”?

Now obviously if their network is at capacity they would prioritise paying customers, but I’ve never heard of there being an issue with DDoS protection for free users. But I have heard stories of sites enabling Cloudflare while being DDoSed and it resolving the problem.

lemmyvore ,

Any stories you’ve heard about websites enabling CF to survive DDoS were not on the free tier, guaranteed.

Please re-read the description for the free tier. Here’s what “DDoS protection” means on free tier:

Customers are not charged for attack traffic ever, period. There’s no penalty for spikes due to attack traffic, requiring no chargeback by the customer.

Will they use some of their capacity to minimize the DDoS effects for their infrastructure? Sure, I mean they have to whether they like or not, since the DNS points at their servers. But will they keep the website going for Joe Freeloader? Don’t count on that. The terms are carefully worded to avoid promising anything of the sort.

Dave ,
@Dave@lemmy.nz avatar

They also say “Cloudflare DDoS protection secures websites and applications while ensuring the performance of legitimate traffic is not compromised.”, with a tick to indicate this is included in the Free tier.

You are honestly the first person I’ve heard complain about Cloudflare failing to protect against DDoS attacks. However, I have no doubt that not having Cloudflare, I would fare no better. So still seems worthwhile to me.

JonnyJaap ,

The first point is only when you use the tunnel function, right ?

Because I noticed, if use the tunnel function (hiding your private ip) the sites gets an Cloudflare certificate, but if just using it as DNS (without tunnel) the page has my certificate.

Dave ,
@Dave@lemmy.nz avatar

If you use DNS with proxy it still applies, you should get a Cloudflare certificate then. But yes, if you use Cloudflare as DNS only, then it should be direct. I believe you get none of the protection or benefits doing this, you’re just using them as a name server.

The Cloudflare benefits of bot detection, image caching, and other features all rely on the proxy setting.

Also if proxying is enabled, your server IP is hidden which helps stop people knowing how to attack your server (e.g. they won’t have an IP address to attempt to SSH into it). You don’t get this protection in DNS only mode either.

Basically if you’re using DNS only, it’s no different to using the name server from your domain registrar as far as I can tell.

keyez ,

I have a cloudflare tunnel setup for 1 service in my homelab and have it connecting to my reverse proxy so the data between cloudflare and my backend is encrypted separately. I get no malformed requests and no issues from cloudflare, even remote public IP data in the headers.

Everyone mentions this as an issue, and I am sure doing the default of pointing cloudflared at a http local service but it’s not the ONLY option.

Dave ,
@Dave@lemmy.nz avatar

I’m not quite sure I get what you’re getting at. If you’re using Cloudflare (for more than just a nameserver), then the client’s browser is connecting to Cloudflare via a Cloudflare SSL certificate. Any password (or other data) submitted will be readable by Cloudflare because the encryption is only between the browser and Cloudflare. They then connect to your reverse proxy, which might have SSL or it might be unencrypted. That’s a second jump done by re-encrypting the data.

How does the reverse proxy help, when the browser is connecting to Cloudflare not to the reverse proxy?

keyez ,

Fair, I was more thinking from the server side not the client side where cloudflare certs are the ones seen first.

neidu2 OP , (edited ) to asklemmy in There were supposed to be 15 commandments, but Moses accidentally dropped and broke a tablet. What are some of the five missing commandments?

I might as well go first:

Thou shalt seed what you download (You’ll understand in a few thousand years)

CH3DD4R_G0BL1N , to asklemmy in How would you feel if Beehaw left the Fediverse?
@CH3DD4R_G0BL1N@sh.itjust.works avatar

Without the loaded malice of some of these comments, sincerely, I forgot beehaw existed. It looked like the place to go during the migration and was constantly getting good word of mouth on all the Reddit move channels. Then the barrier to entry went up with the essay application, which was 100% fine as a decision, but obviously made it a hassle for the masses trying to find a home. Couple that with no open community creation, leaving no landing spot for niche communities and I went elsewhere.

But even after taking a shotgun approach and making accounts on multiple instances when stability and federation was still struggling, beehaw started defederating from everything. Again, 100% your decision. But the reasons were often blatantly showing that beehaw was not willing to engage in the learning process of this new interface with the rest of us.

So, again no malice, I literally forgot beehaw existed till seeing this post. So if your admins and users think you can achieve whatever elsewhere, I don’t see why you shouldn’t.

ipkpjersi ,

I think it’s honestly a good way for them to die out. They’re basically a niche of a niche of a niche at this point, and that’s unfortunately probably not the most sustainable thing long-term.

With that said, maybe they are fine with that.

keepcarrot , to asklemmy in How would you feel if Beehaw left the Fediverse?

Which one was beehaw?

TheCaconym ,

One of the multiple lemmy newcomers that defederated from us; in their admins’ words, because we apparently “deny certain genocides”.

@suspended what “genocides” would those be exactly ?

420blazeit69 ,

The thing about genocide is that the concept was formalized as a crime, meaning you do actually have a burden of proof, and you do actually have to provide evidence, and requiring, examining, and weighing the evidence is no more offensive than requiring, examining, and weighing the evidence against someone accused of murder.

And you do actually have to do this analysis, because “genocide” is thrown around all over the place as a political tactic, and plenty of accusations are bullshit (or are you a genocide denier if you call bullshit on the accusation of white genocide in South Africa?).

dan1101 ,

The one that doesn’t allow downvotes.

Draconic_NEO ,
@Draconic_NEO@lemmy.dbzer0.com avatar

FYI There’s more than just one not allowing downvotes

These are all instances excl Beehaw that don’t allow downvotes (there might be some I might’ve missed):

Ghyste , to mildlyinfuriating in This ad that says “Wake up! A beach house is not a dream.”

Seriously… There is nothing mild about this.

thanks_shakey_snake , to asklemmy in What's an aspect of your job that college didn't prepare you for?

Like… Literally any of it. I’m a software engineer and my degree didn’t have anything to do with software or engineering.

I’d have to really stretch to something like “time management” or “active listening” to find any connection, lol.

mesamunefire ,

Computer Science was great dont get me wrong, but I totally agree. Comp Sci helped with some of the basics, but didnt prepare you at all on the soft skills that get you ahead, nor why task management, version control, and other such concepts are so important.

Fizz ,
@Fizz@lemmy.nz avatar

I can’t believe in my comp sci course they never went over git. Like cmon that’s core to software development these days.

mesamunefire ,

Totally agree! git is a standard for a reason.

It never fails too how many times I have to teach jr devs git right off the bat. Its just weird enough to require a little bit of handholding when they start.

catfish ,

It’s a little unfair to criticise a CS course for not being a SWE course. But I agree that graduating students in CS without having covered the basic requirements in the SWE day job most of them will move into is a disservice.

I did CS (30 years ago) and things entirely missing in the syllabus back then:

  • any and all soft skills
  • version control
  • refactoring
  • testing and the value of testing
  • staging and replicated environments for raw dev, QA, live, etc
JustSomePerson ,

It doesn't require university level study to understand. You took Comp Sci, not applied software development. If you can pass Comp Sci, you should be able to use a system like git without it having been part of a tertiary level curriculum.

Fizz ,
@Fizz@lemmy.nz avatar

it doesnt require university level study to understand

Yeah you can learn it outside of uni but I could say the same for anything in that course. Students wouldn’t know they need to learn it because they haven’t worked in the industry.

During the course you are doing projects with multiple people. Looking back it would have been a great place to introduce version control.

JustSomePerson ,

If you were to study version control in a comp sci degree, you would study the way it's implemented, not how to use it. The data models for how to store and access repositories of many files with many changes is interesting, and can have different aspects depending on if it is text content or binary. Is it optimal to store each file as an aggregate of its diffs, no matter how many. Should there be snapshot points, etc?

Those are the aspects of version control that belong in tertiary level computer science. Learning how to use "git add" and "git push" don't.

toastal ,

Teaching about version control would be preferable to a singular tool. Git wasn’t always the #1 tool nor will it be forever, & there are some great tools pushing against Git as we speak which will be great for all of us when something truly better usurps—like Subversion, the former king. Training on a singular tool is like learning Microsoft Word instead of document processing where the broader concepts are more valuable for your career as you understand not just how but why.

Personally I had a lot of fun giving darcs & Pijul fair shakes in 2023 to understand what makes the patch theory cool to work with. You could probably do a whole course on VCSs & their models since you are correct that they are rather integral to real world teams & projects.

lemann ,

My comp sci course used SVN.

There was one tutor who used git on their course though, albeit via GitHub Classroom so that was probably more a convenience thing

Semi-Hemi-Demigod ,
@Semi-Hemi-Demigod@kbin.social avatar

My university created an entirely new school because while the computer science graduates could do computer science they couldn't write an email or contribute to a meeting.

c0mbatbag3l ,
@c0mbatbag3l@lemmy.world avatar

It’s crazy that someone can go through college for comp sci and never touch things like VSC or PuTTY until they’re in the workforce.

Meanwhile a programming boot camp or IT Security Analyst boot camp will have you digging into the tools of the trade immediately.

thanks_shakey_snake ,

Heh yeah. Lots of fresh grads don’t even really know anything about application development. Like they have a handful of sorting algorithms memorised and can explain what a compiler does (and are thinking about writing one some day) but can’t actually build anything.

Often, they can pick it up quickly, whatever the “it” is… But it doesn’t give them that much of a head start compared to someone who did a shorter program or self-taught.

I’ve never used PuTTY either, tbh… Is that just what Windows users use for SSH stuff?

c0mbatbag3l ,
@c0mbatbag3l@lemmy.world avatar

Not anymore, it’s a terminal emulator but most have transitioned to just using Poweshell to SSH into things. I like multi-tabbed putty and use it heavily when configuring network appliances.

It’s also not a Windows thing lol you can install it natively in Debian, Fedora, and Arch that I know of with the basic package manager of each.

thanks_shakey_snake ,

Oh lol TIL. I just read “PuTTY is an SSH and telnet client, developed originally by Simon Tatham for the Windows platform” on putty.org.

I wonder how many of the people I work with have used it before. Maybe I’m an outlier for never encountering it.

c0mbatbag3l ,
@c0mbatbag3l@lemmy.world avatar

I’ve never used Linux in an Enterprise environment so I don’t know if there’s an easier way to store servers/switches as objects and access them via the standard terminal than MTPuTTY, but yeah I’m not surprised it was originally created for windows and then ported at some later time.

EveryMuffinIsNowEncrypted ,
@EveryMuffinIsNowEncrypted@lemmy.blahaj.zone avatar

How did you become one? Every job description I’ve seen says it requires like a friggin doctorate or some shit. Lol.

thanks_shakey_snake ,

I dunno, most of the job descriptions I see say something like “a relevant degree or equivalent experience…” And lots of places don’t even list an educational requirement, at least for more senior roles.

I basically self-taught while I was working in a different field, and then eventually found a bootcamp with a good alumni network and career placement services. Once you get a little bit of experience, it starts to snowball, but getting that first opportunity (or first few) can be a steep hill to climb.

Oh, and you gotta be pretty good at building software too, of course, but not as good as you’d think to get going-- Most of your learning is on the job, regardless of what educational path you take. In that respect, most go-getters with some diligence and aptitude can exceed the capabilities of a typical compsci grad inside of a year, I’d say.

There will always be employers who think the degree is really important, and there will be roles where it actually is… But plenty just want evidence that you can do the job well.

rubythulhu ,

You just apply anyway.

Usually they’re not willing to pay anywhere close to doctorate money for doctorates anyway, and will end up settling no matter who they pick.

I’m not sure if i’ve ever known any engineer who has met the listed job requirements for their role. They say requirements, but what they mean is “this is my ideal”. Put another way: think of it like a dating app profile. dude may act like he only dates 10s in his profile, but you show him some attention and suddenly you’re just as good as a 10, because he’s lonely and needs affection from someone.

Basically, for most companies, they’re essentially the corporate version of incels. Way too high of standards, but will settle for anyone who is into them regardless of what they think their standards are, because they just need someone ASAP, and their standards disappear quickly once you make yourself available.

I’ve enjoyed a 20+ year long career as a programmer, and I dropped out of college 3 months in because i couldn’t afford it. That’s because early in my career i took a few shitty jobs until i had a decent enough resume that i didn’t have to take shitty jobs anymore. That took study and practice and passion in programming, but i did that for fun years before i even showed up on the university doorstep.

rubythulhu ,

Same except i dropped out of college 3 months in and have enjoyed a healthy career for the last 20 years anyway.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines