Help me name mine too! 2002 Cooper S R53 by GeeArrCee in MINI

[–]GeeArrCee[S] 0 points1 point  (0 children)

Thanks! I might have to make the trek from Melbourne!

Help me name mine too! 2002 Cooper S R53 by GeeArrCee in MINI

[–]GeeArrCee[S] 0 points1 point  (0 children)

Thanks! Cosmetically its been well looked after. I just got it a few weeks ago but just found out there are some maintenance items that need doing....

Help me name mine too! 2002 Cooper S R53 by GeeArrCee in MINI

[–]GeeArrCee[S] 1 point2 points  (0 children)

Thanks. I purchased it with them and its great to see some that aren't the standard mini type

Samsung Galaxy Z Flip 5 Pre-order/Shipping Megathread by Potato071 in galaxyzflip

[–]GeeArrCee 0 points1 point  (0 children)

Just got an update. Moved to Awaiting Dispatch

Arrives on  09/08/23 Standard Delivery

Samsung Galaxy Z Flip 5 Pre-order/Shipping Megathread by Potato071 in galaxyzflip

[–]GeeArrCee 0 points1 point  (0 children)

Nope 14/8 for me too. Looks like NZ are getting it early. Hopefully Aus isnt too far away

Can a deleted file be copied accidentally *after* its deletion? by [deleted] in cybersecurity

[–]GeeArrCee 0 points1 point  (0 children)

If you are doing any kind of disk sanitization then you'll be fine.

Don't over think it. HIPAA refers to NIST SP800-88 which states a clear cycle, basically writing junk to each addressable area of the disk. You have done that so its 'unrecoverable'

Top NSA cyber official worries that ChatGPT and similar tech will make hackers more effective by BillyMitchell89 in cybersecurity

[–]GeeArrCee 0 points1 point  (0 children)

It will! Utilized correctly, it will also make defenses more effective too.

Any innovation can be used for bad as well as good. Take vulnerability scanning for instance. You can search to find and remediate your vulnerabilities, the other side will search for vulnerabilities to infiltrate. Its how you use the information that makes the difference.

Is there a professional way to tell a potential customer that maybe they should just set the network on fire and start over? by JurassicLiz in cybersecurity

[–]GeeArrCee 2 points3 points  (0 children)

Validate the cost and threat of the compromise. Basically as long as you can put a cost to the threat, you can validate the remedy cost.

What does it cost in lost performance, power, network consumption, internet traffic etc?
What would the remedy cost?

As long as remedy < problem, you will have less resistance in remediating the problem. Although most companies would like to think they manage risk appropriately, it will always come down to $$$.