I was under the impression that Tahoe translates to “big water” which is funny.
But “Tar pit Tar pit”, “Way Way” and “Desert Desert” are indeed infuriating.
I was under the impression that Tahoe translates to “big water” which is funny.
But “Tar pit Tar pit”, “Way Way” and “Desert Desert” are indeed infuriating.
Absofuckinglutely not
Looooool.
Even if you live in an area where busses are, they’re slow and limited routes. Times are often inconvenient to work schedules. 1h 30m by bus, 50m biking, 3h 10m walk. A drive to work takes me 15 mins on average.
Depends on ISP.
If IPv4 ban, it is indeed 100% ineffective. Nearly all ISPs either CGNAT or rotate addresses. If IPv6, the ISP just forwards a 64 bit block and leaves it at that. You must call and request a new IP block. In which case you’ll be told yes or no. If yes, it’s either free or paid.
I know with ATT Fiber, they don’t offer address changes unless there is some security or service interruption reason. You have to unplug the modem for 30+ days so the lease expires if you don’t want to do rounds with support. My IPv4 address has changed once, but my IPv6 address block has never changed.
Someone made a mistake here. It’s not getting your IP address. An IP address is assigned by the gateway when you’re connected to an access point. An IP address is not an identity. They are always changing and can be shared. This has already been tested and upheld in court.
It’s actually collecting your MAC address. Which is exchanged when your phone or tablet scan nearby WiFi points or Bluetooth devices. However, this can already be defeated. By default iOS and Android both have the option to randomise the MAC address in intervals. Making it extremely difficult to prove anything. This feature exists because the devices real MAC address never changes. It is unique. Alternatively, users can disable WiFi and Bluetooth scanning entirely. However, your device no longer participates in the Find My Devices program by Apple and Google, location does take longer to acquire in some scenarios, and accuracy may take longer to triangulate.
The hubris the man had was so perfectly demonstrated in his interview.
“There’s a rule you don’t do that. Well I did.”
And now he’s dead.
Something could have gone wrong electronically or mechanically warranting a ballast drop. I have considered this to be a possibility outside of them hearing cracks and suddenly wanting to go up.
I would be cautious with this thought process though. Oil cools, lubricates and cleans the engine. These engines are air cooled so keep that in mind. Degraded oil can’t do the job very well.
Lmao
Clean up your tabs please. Omg
It seems the average in the US is 10 years. But you can develop it and reach critical levels in as little as 5 years. Hard alcohol every day. Multiple times a day.
It’s always been bad practice to just blindly update software. That’s why we have different distros.
Ubuntu and Mint hold your hand and make it easy for newcomers. Great way to dive into Linux. I completely agree these are great for “it just works” and no fuss. I’ve not had one break on me.
Arch and Gentoo expect you to have experience and know what you’re doing. You build it up how you want it. That’s what makes these so great. But you need the experience and knowledge.
I’ve personally tried openSUSE and in my opinion it feels like a good middle ground between both ends. In the past I’ve recommended Mint to get started, openSUSE once you’ve got experience, and then Arch for when you want total control.
You either set the DNS settings per device to the system running PiHole / AdGuard Home, or if your router allows, set the DNS there. It’s ideal to set it on the router.
Any time a device makes a DNS request to a domain, it’s checked against the list. If found, it’s stopped. If not found, it gets sent upstream to your choice of a public DNS configured during setup. I use Cloudflare (1.1.1.1, 1.0.0.1).
No, they can still refuse to provide a device as my original comment states. Since my employer refused to do so, they came up with an alternative without any additional input from me. They completely side stepped the app requirement by using a little key chain once they reached out to Cisco. Your employer has options. They have to find out what works best to make sure you can do the job they have hired you to do.
It doesn’t matter if it’s apps that use data or apps that don’t use data. If your employer requires you to install an app on your personal phone, you can refuse. It is your legal right. If you choose to exercise your legal rights, your employer must provide you with an alternative method that doesn’t involve your personal phone. Whatever they choose.
If you agree to installing a work related app on your personal phone, you must be compensated. If they refuse to compensate, you’re back to square one. They must provide you alternatives.
If your employer refuses to supply you with the tools to complete your job and/or refuse to compensate personal phone use for work related reasons, they are breaking the law. If they fire you for exercising your rights, it’s unlawful termination.
Here’s an example: My employer started requiring 2FA for the computer logins. They wanted me to install an app by Cisco. I said no. You can provide a locked down phone that can be used for the sole purpose of 2FA. They declined as that isn’t in their budget and “unnecessary”. They later came back with a little keychain that’s bound to my account. I press a button on the keychain and get the 2FA code. I can do my job and they did their job and gave me the tools to do so.
My examples are the common scenarios. Apps typically use data. Even if in your case data isn’t used, your employer is still required to provide you with the tools necessary to complete your job. It’s as simple as that.
No matter what app it is, if employers require one to be used on a smartphone, they are legally obligated to provide you with a work phone. If they refuse, they are legally obligated to provide reimbursement for your personal mobile plan. This can be as simple as $5 or $10 added monthly to a paycheck, or as detailed as actual usage down to the kilobyte.
Even if it’s as simple as clocking in and out. If they won’t provide a phone or reimburse, they must have some other method to complete the task. Whether it be a computer or paper. Failing that, they are not upholding the law of providing you tools necessary to complete your job. Which means if they terminate you for any of the above under “not able to do your job”, it is retaliation for you requiring them to do their job. You could potentially win a suit against them.
From their own privacy policy they outline what they do:
For research and development purposes, we may use datasets such as those that contain images, voices or other data that could be associated with an identifiable person.
To provide location-based services on Apple products, Apple and our partners and licensees, such as maps data providers, may collect, use, and share precise location data, including the real-time geographic location of your Apple computer or device.
Apple’s websites, online services, interactive applications, email messages, and advertisements may use “cookies” and other technologies such as pixel tags and web beacons.
We also use personal information to help us create, develop, operate, deliver, and improve our products, services, content and advertising
At times Apple may provide third parties with certain personal information to provide or improve our products and services, including to deliver products at your request, or to help Apple market to consumers.
Apple may collect location, IP Address, network information, Bluetooth information, connected devices, accessories, personal demographics, browsing history, browser fingerprint, device fingerprint, search history, app data, usage data, performance, diagnostics, product interaction, transaction information, payment information, purchasing records, contacts, social graph, watch history, listening interests, reading list, call metadata, device information, messaging metadata, email addresses, salary, income, assets, health data, ad interaction, in-app purchases, in-app subscriptions, app downloads, music downloads, movie downloads, TV show downloads, Apple ID, IDFA, Random Unique ID, UUID, IMEI, Hardware serial number, SIM serial number, phone number, telemetry, cookies, Nearby WiFi MAC, Siri request history, Web sign-in, songs played, play and pause times, playlists, engagement and library.
Literally all of this is what Google does. The only thing Apple does differently is hinder 3rd party apps to a greater degree, whereas Google is more permissive. But to be fair, Google has been improving the Privacy features of Android with each version.
Being able to do this is why Linux is so amazing. If Windows finds a corrupt file and can’t repair itself, you gotta find the package it’s part of (Windows update catalog), or create an ISO that’s updated to do an offline repair. If the registry gets fucked, good luck fixing that.
Most IT positions are salary so this makes sense and is reasonable for critical systems. If you’re not salary, yikes.