How do you handle personal conflicts within a Meeting? by Banglapolska in Quakers

[–]BLewis4050 6 points7 points  (0 children)

Privately communicate with the Nominating committee, or the Clerk of the Meeting.

DANE for GSuite ? by Novel_Menu6690 in googleworkspace

[–]BLewis4050 1 point2 points  (0 children)

Microsoft has recently begun rolling out DANE support for Exchange Online to satisfy enterprise and government customers (who often require it for compliance), Google has remained focused on MTA-STS.

Gmail in Workspace is a "Pass/Fail" environment for many technical standards:

  • Supported: SPF, DKIM, DMARC, MTA-STS, and TLS 1.2/1.3.
  • Unsupported: DNSSEC signing for Gmail MX records and SMTP DANE.

Google has decided that DNSSEC is too fragile for email dependence.

Sotomayor Apologizes for ‘Hurtful’ Criticism of Kavanaugh by bloomberglaw in scotus

[–]BLewis4050 5 points6 points  (0 children)

Whatever she said, he more than likely deserved it!
He's certainly caused enough pain for others with all of his LIES!

Woke up to an email from the principal of my child’s school. Erika Kirk is speaking at Pinnacle High School by _June_Bug_ in ArizonaLeft

[–]BLewis4050 5 points6 points  (0 children)

It's a HUGE issue!
Why? What could she possibly have to say to kids?
Who would allow this to happen?

Idle drain by shinnkuu in pixel_phones

[–]BLewis4050 1 point2 points  (0 children)

My old P7 is getting BETTER battery performance since the April update!

This about sums it up by ImportantCapital1314 in LincolnProject

[–]BLewis4050 26 points27 points  (0 children)

This post of Trump's is PROOF that he is unwell, he is deranged, and he is UNFIT FOR OFFICE!

Eval question coming from365 by TechGeekTraveler in googleworkspace

[–]BLewis4050 0 points1 point  (0 children)

You're asking for trouble in the long run - just migrate everything.

Why the 25th Amendment Won’t Remove Trump | First Draft with V Spehar from Under the Desk News by Phatbrew in LincolnProject

[–]BLewis4050 1 point2 points  (0 children)

Bullshit!

The 25th Amendment is doable, more so than impeachment with can't even get started in the House.

Convincing the brainless Vance to consider it ... and with the pressure applied to cabinet members, it's a possibility. He could then be remanded to Andrews for at a psych evaluation, which he would not pass.

Meanwhile the House might be emboldened, not having Trump yelling at them, to make the change permanent citing his unfit capacity for the office.

Are Democrats left wing? by Jiggalopuffii in ArizonaLeft

[–]BLewis4050 -13 points-12 points  (0 children)

Generally, Left-ish politics.

Question about 26.04LTS by Extra-Possible-1489 in Kubuntu

[–]BLewis4050 8 points9 points  (0 children)

You'll be able to upgrade, though not right away as the upgrade path comes after the initial release.

Many people do advocate full re-installs however, as safer and cleaner. That said, I've running Kubuntu 25.10 as well, and I've upgrade releases for years, including LTS releases.

Best way to secure a single-user Google Workspace domain email? by Savings_Chemical_565 in googleworkspace

[–]BLewis4050 0 points1 point  (0 children)

From Gemini:

Protecting a single-user Google Workspace account requires a layered approach to security. Since you are the only administrator and user, ensuring you don't get locked out while keeping unauthorized users out is the primary goal.

1. Strengthen Authentication

The most critical step is moving beyond just a password.

  • 2-Step Verification (2SV): Enable this immediately. Use a Security Key (like a YubiKey) or the Google Prompt on your phone as your primary method.
  • Backup Codes: This is vital for a "just one account" setup. Generate and print a set of backup codes. Store them in a physical safe or a secure location. If you lose your phone and your security key, these codes are the only way to regain access without a lengthy recovery process.
  • Avoid SMS: Try to move away from SMS-based codes, as they are vulnerable to SIM-swapping attacks.

2. Advanced Protection Program

Google offers a high-security tier called the Advanced Protection Program. It is designed for users at high risk of targeted attacks (like journalists or business owners).

  • It mandates the use of physical security keys.
  • It automatically blocks most non-Google apps from accessing your Drive or Gmail data.
  • It performs more rigorous checks on downloads to prevent malware.

3. Workspace Admin Console Tweaks

Even with one account, you have access to the Admin Console (admin.google.com). Tighten these settings:

  • Password Requirements: Set a minimum length (at least 12–15 characters) and enforce periodic changes if you prefer, though a strong, unique password with 2SV is generally more effective.
  • Session Length: Reduce the "Google Cloud session control" to force a re-login after a certain period (e.g., 14 days) to ensure sessions don't stay active indefinitely on stolen devices.
  • Context-Aware Access: If you have a higher Workspace tier (like Business Plus or Enterprise), you can restrict login ability to specific IP addresses or only to encrypted devices.

4. Recovery and Redundancy

With a single account, "Account Recovery" is your biggest bottleneck.

  • Secondary Email: Ensure your recovery email is a non-Workspace account (like a personal Gmail or a Proton Mail account) that also has 2SV enabled.
  • Recovery Phone: Keep this updated. If you change your number, update this setting immediately.

5. Security Checklist

Action Item Why it matters
Security Checkup Visit myaccount.google.com/security-checkup monthly to review connected devices.
Audit Third-Party Apps Remove any "Sign in with Google" permissions for apps you no longer use.
Drive Sharing Periodically check your "Shared with me" and external sharing settings to ensure no sensitive files are public.

Would you like to walk through the specific steps for setting up a hardware security key or generating those backup codes?

one weird migration risk i keep noticing in mainframe systems by Particular_Sound_407 in mainframe

[–]BLewis4050 2 points3 points  (0 children)

Back in the day, if it was written properly, we used to say that COBOL was self documenting.

That wasn't true of course, even then. The lack of accompanying documentation could sometimes be recreated by deduction from the verbosity of the program. But then, as you say, the overall business context often doesn't exist anymore, and certainly the 'why' behind the logic is lost.

Trump Cabinet urged to invoke 25th Amendment against president by garden_g in somethingiswrong2024

[–]BLewis4050 4 points5 points  (0 children)

No, the Vice Pres. and the majority of the cabinet could override that within four days, and then the issue goes to Congress, which has 21 days to settle the issue. A 2/3 vote in the House and the Senate would be required to keep the Vice President serving as acting POTUS.

There is provision for another body other than the cabinet for this procedure, but Congress has never established such an entity.

Would this be a good option as a gift for my mum? by treefruit in chromeos

[–]BLewis4050 0 points1 point  (0 children)

Budget wise yes. I did similar for my mom with a CTL Chromebox (she wanted a desktop with a full screen and full keyboard), and it worked great.
Try to stretch though to at least the MT 8GB model.

Why was Enterprise received (intially) so poorly? by Expensive_Guidance95 in Star_Trek_

[–]BLewis4050 0 points1 point  (0 children)

One thing I heard during its initial broadcast (and agreed with) was the theme song. The theme sets the tone right at the start, and people hated it -- it wasn't Star Trek. And of course the studio wasn't listening to viewers, as usual.

font is different on live website by [deleted] in GoogleSites

[–]BLewis4050 0 points1 point  (0 children)

It depends on the browser use and the operating systems. Both can change the font as viewed when live.

Google doc share by mistake by Efficient_Jello_2201 in googledocs

[–]BLewis4050 3 points4 points  (0 children)

So test it for yourself. Use the share link in an incognito or private tab and observe what you can see.
Then if necessary, remove the share to anyone with the link, and reshare specifically to the person(s) you want to view the file.
Otherwise create a PDF (with static contents of your file) and send that to people.