Pokey succulent

  • 1 Post
  • 26 Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle
  • Your ISP controls what ports you can access using one or more firewalls and traffic control devices somewhere past the point where you connect to their network.

    They can block whatever ports they want. The only way around this is to use a VPN, which creates a tunnel directly from your device to a remote server to route traffic. This still goes through your ISP and whatever firewall they have but does so over a port that they (probably) don’t block. They can’t see what ports your web or network requests are using so they can’t block it directly.

    Depending on your technical know how and what type of router you have, you could set up a VPN at the device level (PC, phone, etc.) to send just requests from that device or at the router level which could send all traffic from your network through the VPN.

    It’s important to remember when using a VPN that the VPN servers can still see (and potentially log) all of your traffic, even if your ISP cannot. You still need to find a VPN service that you trust to not monitor your traffic.


  • I think this idea could be true for some businesses, primarily those that only use their endpoints (laptops) for simple documentation tasks and/or as gateways to web-based tools. However, in addition to “user demand” there needs to be an adequate business case ($$ savings) plus enough technical knowledge on the IT implementation side to made the move. I’ve worked in shops moving from a large Microsoft Windows footprint to Apple products and it is not always an easy transition, even with tools like Jamf.

    Since companies will still have to rely on a Windows- or Linux-based backend (on prem or cloud) they’ll need admins that can handle integrating those macOS and iOS devices into their MDM systems alongside the Windows systems. There are also a lot of users out there who may have no experience with using a Mac, either for personal or business use, that will need re-training to use a Mac laptop. Both integration / transition of systems and users will introduce delays and downtime into a company’s business processes, increasing the cost to transition.

    None of the above is a reason not to move from Microsoft to Apple, but it’s definitely not a simple process and that can lead to slow (or no) transitions for large businesses, no matter how many users ask for it.





  • “Mallyhacked” - meaning something that is broken or destroyed. I heard this phrase a lot from older folks during my childhood, but never by anyone who wasn’t from my area. My SO didn’t believe it was a real word so I did some digging and I think that it is likely a very regionally accented version of “malahack”.

    Urban Dictionary says that malahack comes from the Lumbee-English slang of southern North Carolina. I don’t think that’s quite accurate because I’m not from anywhere close to North Carolina. My preferred reference is from The Vocabulary of East-Anglia: An Attempt to Record the Vulgar Tongue of the Twin Sister Counties Norfolk and Suffolk, as it Existed in the Last Twenty Years of the Eighteenth Century, and Still Exists: with Proof of Its Antiquity from Etymology and Authority; in Two Volumes · Volume 2 by Robert Forby, 1830:

    Malahack, v. A word ludicrously fabricated, which means to cut or carve in an awkward and slovenly manner.













  • Modal or bamboo underwear - soft, stretchy, silky, the solution to everything I hated about cotton underwear. They are usually more expensive than Walmart (or other box store) brands and take more care when washing, but to me are definitely worth it. You can find them for fairly good prices on Amazon if you don’t want to splurge on name brands, but you have to do the research and check the reviews. You can get them in boxers, briefs, and thongs for men and even more styles for women.



  • This is good advice if your phone is actively being hacked in real time when you turn it off. Otherwise all you’re doing is delaying or temporarily interrupting any data collection that’s going on in the background. Any apps that are sophisticated enough to run undetected by a normal user are also going to restart themselves as soon as the phone boots up again.

    Also, if you are being targeted by a hacker that is knowledgeable enough to actively get into your device (especially an iPhone) without physical access then you’re better off destroying it and buying a new one, along with doing a full reset of all of your passwords, 2FA setup, and anything else you think you’re relying on for “security”.


  • I’m trying out Jerboa but also definitely prefer the current web interface as a PWA on Android. I’d rather have just a great responsive mobile and desktop web interface as my main way to use Lemmy.

    I think that we get too used to relying on mobile apps because the corpo sites don’t care about doing anything beyond the bare minimum cookie-cutter UI to get users, and so we rely on this party apps to actually provide useful features.

    I’m hoping that the fediverse can bring out a lot of interesting and useful web design options, for Lemmy and Mastodon and the other federated tools. Having something that is open and beautiful (and functional) should be a part of the plans for increasing adoption and drawing in more people to the community.