I don’t think a rich person who “won’t flinch at spending 1.1 million euros” would actually ask those questions, they’d just spend whatever they need on it lol
Like a 60k repair to them would be like 50$ to you or me
I don’t think a rich person who “won’t flinch at spending 1.1 million euros” would actually ask those questions, they’d just spend whatever they need on it lol
Like a 60k repair to them would be like 50$ to you or me
How much effort/time/money do you think they put into that white text on black background that’s on screen for like 5 seconds?
It’s negligible, I would be shocked if it wasn’t the same recycled card over and over again that they have some unpaid intern throw in at some point in the final editing stages
It would probably cost more effort/time/money to do a study on its effectiveness than the pre roll does many times over lmao
Looks at the entire networking stack
Yup (unfortunately)
THREE WHOLE MEGABYTES
Me in 2024 holding a 4TB NVMe stick: Still not enough (it’s never enough)
Thanks! I’ll save this, tell myself I’m going to strictly follow it this time and forget about it (again) lol
Is there a historical reason?
If you’re asking that in anything Linux related, it’s probably a Yes 99% of the time LMAO
Ah, makes sense now, that is dumb. I can totally see why they would have issues with automated enforcement, but what you described I don’t see why anyone would be against it lol
I’m confused, do you mean like automated enforcement rules/algorithms like big SM has? I.e. if user gets reported for breaking Y rule X amount of times ban user for Z amount of time and forward to admin for further action?
Straw Man Fallacy: A straw man fallacy occurs when someone misrepresents an opponent’s argument to make it easier to attack or refute. Instead of addressing the actual issue, the person creates a distorted version of the argument that is easier to discredit.
This is what you have done in every single reply you made when I have made it quite clear that this is about the migration being an urgent security issue that the cyber security community at large has been calling attention to.
You avoid all the core points I make and distort them into trivial things that you can easily argue, like the fact that you “Don’t code C much and use Rust occasionally”. It’s irrelevant to the actual arguments and you use it to dismiss the real core issues AKA a Straw Man fallacy
You have failed to argue in good faith and are actually a part of the problem. Good job!
Ah I see your default is to sprinkle in a bit of argumentum ad logicam and add a dash of straw man at the end
Your statement comes across as the migration from C/C++ is more of an upgrade for new features and increased “ease of use” rather than an urgent security issue when it definitely is. It’s more than just a case of a couple of experts and some articles, you’ve got multiple governmental and NGOs like The NSA, The Whitehouse, CISA, DARPA all calling for the migration away from C/C++ to memory safe languages
https://devops.com/darpa-turns-to-ai-to-help-turn-c-and-c-code-into-rust/
“DARPA, the Defense Department’s (DOD) R&D agency, will lean on emerging AI capabilities in a new program to deal with the costly and time-consuming challenge of rewriting C and C++ code to Rust in a move designed to meet the push for federal agencies and private organizations to adopt memory-safe programming languages.”
https://www.theregister.com/2023/12/07/memory_correction_five_eyes/
"CISA, in conjunction with the National Security Agency (NSA), FBI, and the cyber security authorities of Australia, Canada, the United Kingdom, and New Zealand, said its call for better memory safety follows from its Secure By Design recommendations – endorsed by all of these cyber authorities.
“With this guidance, the authoring agencies urge senior executives at every software manufacturer to reduce customer risk by prioritizing design and development practices that implement MSLs [memory safe languages],” the report argues."
~
"CISA suggests that developers look to C#, Go, Java, Python, Rust, and Swift for memory safe code.
“The most promising path towards eliminating memory safety vulnerabilities is for software manufacturers to find ways to standardize on memory safe programming languages, and to migrate security critical software components to a memory safe programming language for existing codebases,” the CISA paper concludes."
Not quite, had I done something more broad than sure. But I reference a specific group of people whose job it is to provide security guidance on such matters. The ones who are out there fighting the good fight, RE’ing malware and busting down botnets among many security things
But I’m sure you are similarly credentialed as the SMEs in the cybersecurity field right?
Tl;Dr: Old farts holding us back, as always
Vast majority of the cybersecurity community: “an absolute ton of exploits come from memory safety issues with C/C++, we should move to memory safe languages like Rust to greatly reduce security risk and make everyone safer”
You: “Ehh Rust has a couple features, but it’s totally not worth switching from my precious precious C”
Not technically a Space Station, but there’s a whole Invader Zim episode on an entire planet being dedicated to fast food, Food Courtia iirc
Lol, a couple times I commented whenever this came up that it was probably pointless deleting like this with the random words and what not because reddit was likely doing some form of versioning or backups of at least the text based content. Especially since said content was/is under inflated executive value because “AI”
I got downvoted routinely because “ThAT WoULd Be Too ExPeNsiVe anD CoMpLiCatED, no WaY thEY dOiN tHaT”…if what you say is true with the true random words and everything, then I was right and they’re doing exactly what I thought they’d do lol
If they’re mass restoring stuff, they’re probably chugging through in batches, betcha if you check in a couple weeks there will be more
Well it was more like a temporary duct tape, but I “installed” a copy of Ubuntu in RAM from the running Ubuntu system so that I could “boot” (pivot_root) into it without restarting it
All because I didn’t want to wait on a ticket for my dedicated server provider to hook in a KVM LOL
(See my meme post I posted to c/linuxmemes a few weeks back for more info)
Toph has entered the chat
If the switch supports it, you login with local credentials first, navigate to its config page and configure LDAP under there. You’ll tell it the IP address of the LDAP server as well as give it its client side configuration. You give it a bind account credentials (a dedicated service account with as minimal permissions as needed) that it uses to lookup the users on the server as well as Organization Unit paths and such
When a user goes to login the switch will query the provided credentials against the LDAP server, if it’s valid the LDAP server will respond with a success and the switch will log the user in
Generally there is always a local account fallback in the event that the LDAP server is unavailable for whatever reason
This is the perfect answer OP, a rich person would most likely never want to see a place like this in person, they’d “send someone”