If he was food motivated to teach with, sure 😁
I usually set out options and give the command to eat. I’m getting better at guessing which food he wants though.
If he was food motivated to teach with, sure 😁
I usually set out options and give the command to eat. I’m getting better at guessing which food he wants though.
If they can smell and taste better than us, I’m sure water is closer to soda for them with many different flavors. My dog gets breta filled water, but prefers mountain spring water > rain puddle > breta filtered > tap.
My dog is the pickiest eater I know. The problem I have is that it is never consistent. One day nothing is good enough, another he ignores steak for kibble, the next is a cat food day, then all of a sudden it is time for steak!
He has the forbidden knowledge that you can crave certain food at the moment, but he has no way to tell be what exactly he wants haha.
Computer related fields are a constantly changing tech stack. People either are constantly growing in their career, or they are falling out of date. That long in the field should either be extremely comfortable, issue with the individual, or lack of drive to be constantly challenged.
The hardest part is the first job. After that should be constant career growth. This observation is only for the US job market.
I am not sure about upcoming events, but if you have a phone I would highly recommend Stellarium. It helps identify everything and you can change your view based on time and location.
Let me introduce you to: https://reddthat.com/c/dog_doesnt_eat !dog_doesnt_eat@reddthat.com
Those pride flags look awesome 👍 love the color selections!
There are literally hundreds to thousands. Many of them are horded by governments, APTs, and pen testers. I personally abused a 10 year old CVE for pen tests that was known to be used by non US government entities for a zero click code execution on opening a word doc.
Then there are things that are vulnerabilities but cannot be fixed as they are intensic to how Windows functions. Some can be hardened from the defaults but break compatibility and some cannot be fixed without a complete rewrite of how Windows and AD work. Disa stigs will give you defaults that can be hardened. Requirements for all domain users to see all GPOs, users, groups in order for AD to work is an example of something that cannot be fixed without a complete rewrite. That means an in privileged user can get a list of all users, all domain administrator, names of all computers on the domain, etc. As an attacker, that is invaluable.
Short answer, that list is to big and changes constantly. None that would be comprehensive, but disa stigs is a good place to start.
If you think anything on the Internet can ever be forgotten… Your going to have a bad time. Passwords, one of the most protected data types, are compiled from beaches into huge databases so that hackers can use them to try to log into website. There are literally dozens of not hundreds of those password databases on the public Internet to be downloaded, not to mention private or dark web collections. If passwords are not safe, what makes you think publicly available social media would be any different?
Even if somehow the whole federation agreed to purge all post every year, things like the Internet archive and Google cache of pages would retain the data.
Agreed. Had to get a travel one to go with me on trips…
Thank you for the answer. I have delt with scaling DBs with tons of data so the alarm bells were ringing. DBs tend to be fine up to a point and then fall over as soon as the isn’t enough ram to cache the data and mask issues of the DB architecture. With the exponential growth of both users and content to cache, my gut tells me this will become a problem quickly unless some excellent coding is done on the back end to truncate remote instance data quickly.
Sadly I am better at breaking systems in wonderful ways than building systems for use, so I can’t be too helpful other than to voice concerns about issues I have ran into before.
A quick question related to the DB, is the data broken into many smaller tables or is most data in one or two tables? If it is all in one, we may run into performance issues as soon as the DB becomes to large as queries run against whole tables unless promised really well.
As an offensive security worker… I can’t help but read people listing out their attack surface 😂
Bonuses are discretionary. Stock is questionable, especially if it is not immediately 100 percent vested, 401k tells me they are completely out of money and can’t / won’t source additional funding.
In tech, you should always be looking at the next job, even if you are comfortable where you are. Loving what you do, who you work with, work life balance can all offset certain amounts of money, but knowledge and experience is either always growing or growing stale. I’m guessing at early 30s, you are not in an exec position and changing companies with lead to faster career growth than sticking around for the company to turn around it’s books and promote you.
It is always good practice to set up certificates everywhere. I do it for all of my internal services. Each person has a different level of care for how important privacy and security are and some people have abnormal threat profiles.
With that being said, options are usually to run self signed certificates, roll your own certificate authority for your network, or get valid certificates from a service like letsencrypt.
OMG, posts load instantly now, used to take 3 to 15 seconds. I’m in US East Coast for reference.