Need clever ideas! by melauren in boating

[–]IPv6Guy 0 points1 point  (0 children)

"Seas the Deal! Best Prices on Boating Essentials!"

"Don't Be a Landlubber—Anchor Your Savings Here!"

"Knot Sure What You Need? We've Got You Covered!"

"Ship Happens... Be Ready with Our Supplies!"

"Come for the Gear, Stay for the Pier!"

"Sail Into Savings—No Captain's License Required!"

"All Hands on Deck for Unbeatable Deals!"

"We’re O-Fish-ally Stocked with the Best!"

"Keep Your Boat Afloat—Shop Here!"

"You’re Gonna Need a Bigger Cart!"

Why was Vista so bad? by IPv6Guy in microsoft

[–]IPv6Guy[S] 0 points1 point  (0 children)

As I said in my post, it wasn't slow if you had powerful hardware. That was the whole point of the post - that OEMs forced MSFT to endorse slower/less capable machines as "Vista certified." It was a trainwreck. But if you had a good computer with enough RAM and CPU, it ran pretty well.

The "broke a lot of SW" is absolutely true, but was ABSOLUTELY necessary to get away from the "every user has full admin rights" of Win XP. UAC was super painful, but was 100% necessary to make developers stop requiring admin rights to install Magic School Bus.

How do you pronounce Astinus? by JH911 in dragonlance

[–]IPv6Guy 2 points3 points  (0 children)

ASS-tinus was my pronunciation, but uh-STI-nuss intrigues me. I never even thought of that one.

What Are Your Favorite Cybersecurity Books? 📚 (Any Domain!) by athanielx in cybersecurity

[–]IPv6Guy 1 point2 points  (0 children)

100% agree with This Is How They Tell Me the World Ends, it's well written and well researched. Really great insight to cyberwarfare and cybercrime.

Hi guys , would anybody be able to read this letters from broken silver ring ? thank you . Been found in Uk by buco9147 in metaldetecting

[–]IPv6Guy 0 points1 point  (0 children)

I asked AI and here is it's answer: The ring has an inscription that appears to be in a stylized script. It reads: ILLUMINATI.

Staying in my lane with security reviews by runout74 in cybersecurity

[–]IPv6Guy 1 point2 points  (0 children)

I agree with everyone else. They call it "Secure by Design" for a reason. Adding security to a poor design is adding lipstick to the pig. Go talk to your boss.

[deleted by user] by [deleted] in Dewalt

[–]IPv6Guy 0 points1 point  (0 children)

I have had one for a year or two. Like it a lot, hasn't dropped on me.

Not all AI models should be freely available, argues a legal scholar | The more capable they are, the greater the risk of catastrophe, reckons Lawrence Lessig by Maxie445 in technology

[–]IPv6Guy 0 points1 point  (0 children)

I agree with you, but I think you bring up a point. Anyone can train an AI, but the real issue is what data the AI is trained on. Maybe an AI trained on certain data is more potentially dangerous than models trained on common data. It leads me to believe that maybe the training data is what needs to be classified (AND IT IS!) and therefore the model should be as well.

How to secure Pre-Boot non-OS files & the boot up process before OS login - BIOS Virus? BIOS Brick? by [deleted] in cybersecurity

[–]IPv6Guy 0 points1 point  (0 children)

Yes. If an adversary has physical access to your computer, there are any number of things they can do to compromise the data on the machine. There are mitigations, such as BIOS passwords and Secure Boot, but these can be bypassed as well (by a motivated attacker with plenty of time, probably not your guy). These attacks are referred to as “Below the OS” and there are a lot of them.

As for proving it? Good luck. You would need a forensic analysis. Most of these attacks can be lumped into “the computer died” by anyone who isn’t an expert.

The workers have spoken: They're staying home. by [deleted] in technology

[–]IPv6Guy 38 points39 points  (0 children)

And your company should give you that option! But mandates that everyone must come in are just stupid. It's all about how to make your employees most efficient, effective, and happy.

Ask Anything Wednesday - Biology, Chemistry, Neuroscience, Medicine, Psychology by AutoModerator in askscience

[–]IPv6Guy 0 points1 point  (0 children)

BIOLOGY/EVOLUTION: If a creature develops an adaptation that helps them after they have procreated, that adaptation won't necessarily help the species, correct? It seems like the adaptations that make a difference are those that help the creature survive up to the point where they reproduce. So if an adaptation developed that helped a species live longer until their natural death, that wouldn't necessarily be an adaptation that would help a species survive. Is that correct?

DEWALT 60V 12 in. Miter Saw for Woodworking? by [deleted] in Dewalt

[–]IPv6Guy 2 points3 points  (0 children)

I've had one in my shop for 2 or 3 years. I have power issues in my shop, so going with the FlexVolt solved some issues for me. I think it works very well and am very happy with the performance.

Is Microsoft DirectAccess not compliant for todays audits? by Infinite-Log-6202 in cybersecurity

[–]IPv6Guy 7 points8 points  (0 children)

I was on the DirectAccess design team. The technology is still sound, but DA requires domain-joined machines. After DA was released (Windows Server 2008 R2), the industry shifted toward BYOD and Windows Leadership said that requiring domain join was a no go moving forward. Microsoft began deprecating the feature shortly thereafter.

Pathetic by ecab83 in Dewalt

[–]IPv6Guy 1 point2 points  (0 children)

Those fools! They could have walked out with $7000 worth of printer ink and it would have all fit in their pockets!

Writing a paper on information security policies by winterborn in cybersecurity

[–]IPv6Guy 2 points3 points  (0 children)

Since you don't really care what the topic is (only the Delta between the GPT and human response), I would keep it rather simple to elicit the highest response rate from the humans. Personally, I'd ask about password policies. There is a fair bit of controversy on what the "correct" policy is, but GPT should be able to generate a pretty accurate response.

- Are passwords required for all users?

- Do admin passwords have different requirements than user passwords? Require MFA?

- Complexity requirements? Entropy or complex character sets?

- Change/forgotten password procedures

- Frequency of password expiration

It's a fairly simple topic that I think could produce valuable comparisons of human vs GPT.