• 0 Posts
  • 44 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle
  • SGG@lemmy.worldtoMemes@lemmy.mlIt's just a formality really
    link
    fedilink
    English
    arrow-up
    45
    ·
    12 days ago

    Yep, companies give “unlimited PTO” because it’s a way to actually reduce the amount of PTO employees take.

    Give them 20 days PTO/year? They’ll take around 20 a year.

    Give them unlimited PTO? They need to justify every bit of PTO, so probably only get to take 4 or 5 for important days.




  • No, this means the recovery key or other external unlocks have been lost, but the TPM chip is still working correctly to provide the bitlocker key during boot.

    This is not bypassing bitlocker, simply bypassing loading the bsod causing crowdstrile driver by booting into safe mode. You still need a valid administrator account so authentication is also not compromised.

    You would still need some kind of exploit to bypass the windows login screen.




  • SGG@lemmy.worldtoSelfhosted@lemmy.worldThumb drive heating up
    link
    fedilink
    English
    arrow-up
    13
    ·
    5 months ago

    If you have docker containers and other stuff all on that USB drive I’d really reccomend getting it all off that USB (not just logging) and onto a proper drive of some kind. USB thumb sticks are not reliable long term storage, you will wake up to find the drive failing one day and good chance you lose everything on it with little to no warning.







  • Given the abstract nature of a lot of the economy these days (which unsurprisingly benefits those with wealth) it’s debatable if it fits to be honest. I would lean more towards yes. They would argue that by exposing bad conditions, helping people lower the cost, causing a rental to go empty, or whatever else means they aren’t getting the money they feel entitled to.

    The same kind of arguments are often used when corporations argue that piracy is stealing. All that has happened is an unauthorised copy of a movie/etc had been created. Yet that is called stealing and they try and fine people sometimes thousands more than what a legal copy would cost.



  • Mine is nice and quick in regards to the web interface and general functions. However I run it on a server at home and my upload speed isn’t the best, so if I need to pull a larger file (Files On Demand enabled) then obviously the transfer speed of the file is a bit sluggish.

    Hosted on a VM with 16GB RAM, 4 cores. Using the NextcloudAIO docker deployment option, all behind an Apache reverse proxy (I have a bunch of other services on another VM that all have reverse proxy access in place as well).


  • SGG@lemmy.worldtoSelfhosted@lemmy.worldvpn on nextcloud?
    link
    fedilink
    English
    arrow-up
    3
    ·
    9 months ago

    In very basic terms, and why you want to do them:

    Attack surface is the ports and services you are exposing to the internet. Keep this as small as possible to reduce the ways your setup can be attacked.

    Network topology is the layout of your home network. Do you have multiple vlans/subnets, firewalls that restrict traffic between internal networks, a DMZ is probably a simple enough approach that is available on some home grade routers. This is so if your server gets breached it minimises the amount of damage that can be done to other devices in the network.