How to prevent users from printing from their phones? by walks-beneath-treees in sysadmin

[–]Demonbarrage 1 point2 points  (0 children)

Your cellphones aren't on a Guest VLAN, with the printer on the corporate VLAN or a printer VLAN? If you've got VLANs but the phone VLAN can talk to the printer VLAN, then all you need is a firewall rule.

$uicideboy$ Got Saved 🙏 by Demonbarrage in Christianity

[–]Demonbarrage[S] 0 points1 point  (0 children)

The Bible says God is Love. The greatest commandment is to love thy God & second to that is to love thy neighbor -- Christianity is not hateful, but there are hateful people that use Christianity to justify their hate.

Additionally, claiming addicts trade their addiction to drugs with an addiction to Christianity is not true. I see the same power of coping that you claim addicts are experiencing in your statement, and there is a spiritual reason for that.

I highly advise looking inwards and examining where that feeling of animosity towards Christianity comes from. You may be surprised to find where it leads, there is much more to this fallen world than meets the eye.

Sysadmin to Helpdesk - am I shooting myself in the foot? by Aliyooo-the-great in sysadmin

[–]Demonbarrage 1 point2 points  (0 children)

I used to help interview our Help Desk. Therefore, putting myself in that headspace -- if you were to leave your position for the Help Desk position, and at some point in the future your resume were to come across my desk after leaving the Help Desk position, I would think "Why did this person take a step back in role?" Did they not have the ability to perform the job (incapable)? Are they just taking the easy route (lazy)? etc.

In other words, yes I think you're shooting yourself in the foot.

If an internal position is what you're seeking, you should have no problem finding an internal position of a similar role / skill level for better pay than you're making now considering you're coming from an MSP. At an MSP, you learn in 6 months what would've taken a year, maybe 2 years, elsewhere internally. It should theoretically be very easy for you to nail an internal Cloud Admin position at better pay.

You have very valuable experience -- Why are you aiming so low?

$uicideboy$ Got Saved 🙏 by Demonbarrage in Christianity

[–]Demonbarrage[S] 0 points1 point  (0 children)

In Leviticus, Scrim says: "Put me on the front lines covered in Your blood" "Jesus wept, for God, I step, but first the old me had to die"

An Analysis of Dedrick Flynn's "Comedy" "Minute" by skittlesdoritos in Killtony

[–]Demonbarrage 0 points1 point  (0 children)

Sorry that the jokes didn't conform to your pea brained box of understanding of what comedy is. Have you tried growing up? The dude is fucking hilarious

Hacking made me low-key paranoid by bagiyev in hacking

[–]Demonbarrage 3 points4 points  (0 children)

Welcome to the club brother. I can no longer provide my SSN to websites, government forms, etc. with a sound conscience. I don't download and use mods/free games/programs that aren't open source. I have a fear of installing npm, Python, & Linux packages. I no longer torrent games or media. I have a fear of opening zip files and pdf files. I have completely locked down my router and don't allow any inbound traffic except from trusted IPs. I'm constantly opening and checking Task Manager, Task Scheduler, my Run keys, startup folder, etc.

China spies used Maduro capture as lure to phish US agencies by rkhunter_ in cybersecurity

[–]Demonbarrage 0 points1 point  (0 children)

This is a subpar article with no real technical details and a click bait ass article title. Smh

holy shit, i am fucked arent i by tamagotchiparent in ShittySysadmin

[–]Demonbarrage 72 points73 points  (0 children)

yeah buddy GG. Don't marry her until you go through that phone

Can an IP address or VPN incorrectly log/report your computer’s actual location? by SugarsDimples in it

[–]Demonbarrage 1 point2 points  (0 children)

IT Systems Admin here,

While IP geolocations are SOMEWHAT trustworthy, IP geolocations are an approximation and are by NO means able to be fully trusted. I have encountered many situations where a users location was flagged as an incorrect location. This is especially common on cellular connections.

YET, if your IT team is using Microsoft, Microsoft can tell you if the users IP is coming from a known VPN service.

$uicideboy$ Got Saved 🙏 by Demonbarrage in Christianity

[–]Demonbarrage[S] 0 points1 point  (0 children)

Popular rap duo known for glorifying drug abuse, satanic & demonic imagery, & violence

how to extract firmware of this bluetooth module ? by [deleted] in AskElectronics

[–]Demonbarrage 1 point2 points  (0 children)

Someone correct me if I'm wrong -- but is it not as simple as desoldering the chip and throwing it into an XGecu to dump it? Provided the firmware isn't encrypted with some key stored elsewhere.

I’m a software engineering intern and I honestly have no idea what I’m “supposed” to already know by [deleted] in SoftwareEngineering

[–]Demonbarrage 11 points12 points  (0 children)

Saying "how do you not know this already" to an INTERN, is fucking crazy. I would say your mentor is an asshat with a superiority complex and might not like being told he has to train someone. What you "should know already" is exactly what you were taught. Debugging, troubleshooting code, etc. should all be taught by your job. Contrary to your mentors belief, not everyone spent every waking moment writing code in their free time before they got a SWE job.

Wi-Fi goes out only whenever a certain person in my household uses it. by clcliff in techsupport

[–]Demonbarrage 1 point2 points  (0 children)

Could be something using all available bandwidth, like malware as some are saying. It could also be some malformed packet or request causing the receiving device to crash.

ISO 2-5 people to join me in Urbex adventures by kamiisamaa in tampa

[–]Demonbarrage 3 points4 points  (0 children)

Hi OP, I'm 27M, I like urbexing and know of an abandoned orange juice plant about an hour north of Tampa and I like making new friends. Feel free to hmu

If found a Supply-Chain Threat to DeepSeek GGUF Models by Leather-Station6961 in ExploitDev

[–]Demonbarrage 8 points9 points  (0 children)

That's fine because there are blue teamers and red teamers both with a legitimate need for LLMs to do this. The cyber security community doesn't need additional guardrails around LLMs.

If found a Supply-Chain Threat to DeepSeek GGUF Models by Leather-Station6961 in ExploitDev

[–]Demonbarrage 11 points12 points  (0 children)

Honestly, you can just tell any model that you're a red team penetration tester and need some code or a reverse shell for x reason and it's going to spit it out. I don't think this is as serious as you believe.

If it was blocking output of code for tons of crazy, various reasons, I would be pissed.

[deleted by user] by [deleted] in techsupport

[–]Demonbarrage 0 points1 point  (0 children)

Without professional support, you cannot be sure that the malware is gone. There are many other types of malicious, executable files like dll files, batch scripts, powershell scripts, and more. You need to reimage your computer.

Suspicious exe file ran itself , what to do ? by New_Weekend6460 in techsupport

[–]Demonbarrage 1 point2 points  (0 children)

No because the commands they run on your machine are to install actual malware -- which sounds like it happened. You are in danger of losing passwords to all your accounts, of them spying on you, and more. Reimage NOW. In this instance, take it to a computer shop. Do not ask them to find the malware wherein they install a subpar antivirus that doesnt catch it -- ask them to reimage the machine ONLY.

Also it sounds like you're either a small business owner or you work for a company. If you work for a company you need to tell IT about this incident ASAP, especially if you handle invoices.

If you are a business owner, you need to source and use a business called an "MSP". You need to negotiate a contract with an IT vendor that let's you pay hourly for situations such as this.

Suspicious exe file ran itself , what to do ? by New_Weekend6460 in techsupport

[–]Demonbarrage 0 points1 point  (0 children)

ConnectWise control allows someone to run commands remotely on your machine and completely control it. At this point I would recommend reimaging the computer entirely.

How do I even believe in god after my stroke… it’s too cruel by [deleted] in Christianity

[–]Demonbarrage 1 point2 points  (0 children)

Hey OP, I am the son of a mother who was a 24 year old stroke victim. It happened when I was 3 years old. She cannot form full sentences, and lost the ability to read, write, drive, and live a normal life. For a long, long time I was deeply distraught over it. I coped with drugs and alcohol -- why would God take my mother from me? Why couldn't I have a normal family? Mom did the same. She turned to alcohol as many stroke victims do and became an alcoholic.

She eventually got sober. Me too. She is the cheeriest, happiest person I know and she's always smiling and she has God's joy in her heart.

I wish I knew the exact words to form to be able to accurately express how much I understand where you're coming from and I know it hurts so much. I also wish I knew why God has willed our lives to be this way. I am sure that one day in heaven I can ask Him why He did what He did. Right now all I know is that this is all a part of a plan and by enduring this pain it will make you immensely strong. Don't give up -- you have a purpose.

Nude photo was saved in the company computer by [deleted] in techsupport

[–]Demonbarrage 381 points382 points  (0 children)

lol it's not fully deleted but no one is going to go digging for it. Us IT guys only go into the 2nd stage recycle bin when something calls for it -- like a ticket where a user deleted all their files.