It’s TPLink. Budget networking equipment comes with budget security principles.
It’s TPLink. Budget networking equipment comes with budget security principles.
IT is actually a vast field with many many specialties similar to medicine. Asking the copier guy why your server is down is kinda like asking a podiatrist why you’re sad all the time.
Prostitution is not specifically gendered and sex for pleasure’s sake is not specific to men. There could be male or female customers seeking male or female prostitutes.
I wasn’t saying to use Netflix that doesn’t even make sense. I was saying that’s the same price as a Netflix subscription…
It’s more expensive than one other provider, iDrive. But iDrive doesnt provide nearly the same level of service. Back laze is the cheapest full featured B2 service on the market. If you are concerned about data integrity of your backups but you cannot afford $18 a month, then you cannot afford to have that much data.
So… $18 a month? That’s a Netflix subscription homie.
Considering it hasn’t happened in the US yet…
The company makes the rules under which you are employed. If you don’t like it, legislate against it or find another employer. Also, like I said, there are no 3rd party authenticators that are more secure with entra ID.
Like I said, M$ auth literally does not report location while authenticating. It only pulls location requests when signing in through the app to create the authentication token and even then it is not a requirement. Entra pulls location using your IP address on the device you are signing in with.
It is using windows hello on compatible machines and through persistent tokens on Mac and Windows machines not compatible with hello. You have to create that token with a known factor such as a mobile device but outside of that, users almost never have to sign in with persistent tokens.
Ms auth is a mobile only application. Not even available on windows or macOS. The point of it is to provide a second factor of authentication in the for of “something you have”. There are a few factors that can be used for authentication. Something you know (password), something you have (hardware like a key or a phone), and something you are (iris scan, DNA, fingerprint, other biometric). Ms auth uses something you have and something you are to authenticate most users. You provide a password and then you prove you have your cellphone and your cellphone checks your biometrics to see if you are you. In that way, it is effectively checking all 3 factors.
It doesn’t change anything for the company with exception to billable IT time used when the authenticator confuses users which is already high with only one authenticator.
It doesn’t report location, Entra login reports location regardless of authentication method used.
I work for an MSP servicing 5k users all of whom I force to use M$ Auth app. Because it is the best Authenticator on the market, their company is paying for it, and because I look at the sign in logs for 3-4 different organizations every day to see literal hundreds of foreign sign-in attempts that fail due to M$ MFA. Yeah fuck monopolistic megacorps but understand when they provide an actual good product that is safe to use and actively protects you as an individual better than anything else out there.
All that said, the most likely reason is that they don’t want to make a document explaining how to set up MFA for each of the dozen+ apps out there and they certainly don’t want to talk to users who don’t know what they are doing with which ever app their kid set up for them
I’m sure you know what you’re doing better than 80% of the other employees in your office in this regard but I can tell you from experience, when one person gets their way, everyone wants theirs too.
This is a metaphor for life in general. If you find that all your interactions are negative, check yourself. Are you the problem in your relationships and interactions? How can you fix that? Clean your shoes.
If everywhere you go smells like shit, check your shoes.
What’s wrong with Manjaro?
If you brute force using single iterations of all possible combinations sure. But people don’t do that. They use fully readable passwords and letter substitutions. This makes dictionary attacks viable. There are a known number of readable words and phonetic combinations that are significantly easier to brute force. And also the vast majority of numbers are also guessable because most numbers are dates. Series of 2 or 4 or 8 numbers to form important dates means there are lots of numbers between 1940-2024. People don’t usually unconditionally random alphanumeric passwords. Therefore peoples passwords will never be fully secure against sufficiently advanced brute force methods.
But don’t use lastpass, they are the most popular, and with the largest breach history. In fact, if you are capable of the admittedly high bar of self hosting, use bit warden instead.
Steals a tricorn hat
FTFY
Every vote splits a vote for every other candidate. That’s how first past the post - winner takes all elections work. I would wholeheartedly agree with your sentiment if our voting system didn’t encourage our ugly two party system. I don’t particularly like Joe Biden as a candidate for the next 4 years either. But I understand that the system doesn’t work for me, meaning I have to work within the system. If I want my vote to produce any meaningful change, I have to make sure my vote goes to the candidate that I believe has the best chance of winning while providing the least amount of harm to the country and the highest chance of productive change of that system. That happens to be Biden this year which sucks. But it’s not as dangerous as allowing Trump to win who has clarified twice now that he intends on authoritarian action and being a dictator day one.
TS has always, and I do mean always, been garbage.