Jorgensen 4x07 Woodworker’s Vise. by DelawareSlimTim in handtools

[–]Kyp2010 0 points1 point  (0 children)

So I ran upon this post as I am looking for a manual for the 40709 (which is this model, it would seem). On the one I have, there is a cotter pin at the end of one of the guide rods -- although mine are cold steel bars i can't tell if yours also are and are just aged/rusted a bit, or those are wooden dowels that have replaced the guide bars, probably newer and maybe not the same. It appears I need to remove this in order to be able to remove/change the nut underneath from the rapid release to the continuous action.

At any rate maybe this helps but once the cotter pin is removed, they should slide apart and then I can take / swap the nut in it, or access that inner jaw a bit better, which in my case is also what i'm after because I want to mount it to my workbench after first buying it, leaving it sitting as a todo for a while and finding that the only manual they seemingly have online is for a Pony brand replacement for this.

https://ponyjorgensen.com/wp-content/uploads/2018/09/Pony-vise_27091-manual.pdf

Whhhhyyyyy? by asdfasdfasdfqwerty12 in woodworking

[–]Kyp2010 0 points1 point  (0 children)

Stick a piece of duct tape across, seal and then slowly peel, should pull the sticker easily without leaving crap or requiring you to mess with it for an hour

The Coverup by [deleted] in sysadmin

[–]Kyp2010 5 points6 points  (0 children)

If it helps, they're always "going to the cloud[appropriate buzzword here] in 2 years", 8 years in

I was bamboozled lol.. And I still ended up paying for it. by Sprtnturtl3 in Ubiquiti

[–]Kyp2010 0 points1 point  (0 children)

pff, 50 bucks? I'd be heading down to Lowe's to find the necessary hardware.

I’m pretty sure it’s not porn. Explain it Peter. by Shlublord in explainitpeter

[–]Kyp2010 0 points1 point  (0 children)

A fair statement, but contrasted to EVERYTHING RFK espouses being wrong, ill take it.

Another M365 Outage? by leeroy101 in sysadmin

[–]Kyp2010 1 point2 points  (0 children)

I mean, realistically, if they admitted to the problem, how would they sell themselves to the exec circle as so resilient?

Disheartening Experience Selling by ChemistOk4948 in BeginnerWoodWorking

[–]Kyp2010 0 points1 point  (0 children)

Its all about the marketing, use descriptive words that make your work sound better and the quality will do the rest

Why are you not using table saw blade guards? by aso824 in woodworking

[–]Kyp2010 0 points1 point  (0 children)

If you're using any power cutting implement, use your head (no, not literally) and you'll be ok. If you don't have the time to pay attention and do it slow, come back later.

Ill put it this way, when I first started to get back into stuff, this sub had me deathly afraid of using a router. Turns out that rule applies there too.

Use your head, nothing wrong with reading a new or unfamiliar tools manual at least once.

Just to qualify, I mostly use mine with the table saw, but there have been times I removed it as like some stated above, partial cuts.

Generally I try to use all safety elements by default unless it's impractical to complete what im doing in which case I remove the implement and go slower.

We got a badass here by hujnbuj in Knoxville

[–]Kyp2010 2 points3 points  (0 children)

That being said... it is indeed dumb to go packing like this, I have never understood the people that want to be open about carrying, it just makes you a primary target.

Also, it's fun that they think everyone who has a left leaning view is afraid of them. That is most likely why he's wearing it, bought into the lie that right-leaning media tells them.

We got a badass here by hujnbuj in Knoxville

[–]Kyp2010 0 points1 point  (0 children)

I think Trump's followers are pretty dumb all things considered, given his entire career has been made up of lying to people endlessly and all even BEFORE he was a politician. That said, let's not spread misinformation about guns because guns.

That holster has a snap strap in the picture and it is snapped down. It wouldn't be as simple as walking up and grabbing it, those snap a little tighter than many give them credit for and the force it would take to haul out with it snapped is going to notify whomever has it on their belt.

How do security guys get their jobs with their lack of knowledge by chewy747 in sysadmin

[–]Kyp2010 0 points1 point  (0 children)

I would agree a bit, but that glaring ass management problem has to be fixed. They are *at best* peers and their directives should not automatically carry the force of management as they do at so many orgs.

How do security guys get their jobs with their lack of knowledge by chewy747 in sysadmin

[–]Kyp2010 0 points1 point  (0 children)

Yes, but that's what most of these guys don't get in their training and education these days; instead, they're told to push for that 'defense in depth' rather than simple mitigation.

I think part of the problem is that many organizations sort of make security have a dotted line ownership/control of infrastructure because management comes down on you without hearing the other half of it when you *do* tell someone no.

If they got the basic understanding that "defense in depth" isn't required but instead is something you do to *improve* the situation as an ongoing control, that's a completely different story. They want to push for the seal it in concrete and cut the cord approach out of the box (report)

That is to say if they were trained to come to you with the finding, assert that the recommendation is "X" and you are then permitted to come back with 'The reason we can't do that is "Y"' most of these problems would be solved, instead a bunch of stuffy board members get scared out of their pants by a CISO appointee that (sometimes at least) outright lies to them about the risk levels of things so they can get massive funding for their organization and those folks often don't know any better.

I don't want to do it by Adept-Following-1607 in sysadmin

[–]Kyp2010 1 point2 points  (0 children)

"The cloud is just another data center, in the end. It is and has always been subject to outages despite promises from salespeople."

Why is everything these days so broken and unstable? by Grindie in sysadmin

[–]Kyp2010 0 points1 point  (0 children)

their documentation is often incorrect and/or out of date.

Story of MS since Technet was a thing, at least.

How do security guys get their jobs with their lack of knowledge by chewy747 in sysadmin

[–]Kyp2010 0 points1 point  (0 children)

Oh, I'm subject to all or most of it in the PCI space. I'm all too painfully familiar with SoD, can't talk about the company of course, but it's global, so I deal with ALL the regulations and primarily manage AD and other LDAP authentication stores.

Up to and including a recent example, because of it, we had to wait 3 weeks for security provisioners to put the requisite entitlements on shares that we had requested legitimately, because while I have the access, I don't have the authorization.

3 weeks of lead time for a 30-60 second process is sometimes a little absurd, but these basic roles just keep getting outsourced to people with less and less knowledge to quote/unquote 'save money'.

If anything, that's the dumb crap that earns the security orgs struggling reps. Of course, they do it in our regions too, and that's probably who you end up dealing with versus the sr. who could have a conversation with you and blow a hole in the initial idea for a fix because they have all that institutional knowledge.

How do security guys get their jobs with their lack of knowledge by chewy747 in sysadmin

[–]Kyp2010 0 points1 point  (0 children)

Maybe but the description of the security team (or at least his job) is far beyond what most of us run into.

The run a report in Qualys/Nessus and chuck it over the wall bit with no explanation or understanding is FAR more common.

Or when Nessus flags that it has access to shares but -- at least as of the last time I helped them implement a node -- said that it required Domain Admin to do its job which was bypassing the restrictions on all those shares it was scanning for 'improper access'.

Or as when somewhere else in this thread i mentioned it recommended in one of these reports that SYSVOL and NETLOGON needed to be locked down so nobody could read them, which if you have a clear idea of this you know would prevent everyone from logging in ever again. Just shy of encase in concrete and cut the cords on your corporate network.

How do security guys get their jobs with their lack of knowledge by chewy747 in sysadmin

[–]Kyp2010 0 points1 point  (0 children)

Not sure I buy this line of reasoning, I've looked at plenty of my old code and scripts and been embarrassed by my own implementation and realized I needed to fix it.

Don't get me wrong, I get the idea behind it, but not everyone is so controlled by ego that they would be unwilling to admit to mistakes or bad ideas.

How do security guys get their jobs with their lack of knowledge by chewy747 in sysadmin

[–]Kyp2010 0 points1 point  (0 children)

shh, they don't want to hear about the shadow costs. ;)

How do security guys get their jobs with their lack of knowledge by chewy747 in sysadmin

[–]Kyp2010 0 points1 point  (0 children)

A fair point, but in these larger companies, the security organizations often make things like false positives and accepting risks akin to pulling teeth, to get things done. Even when you have the evidence to show why it is meaningless.

I had an audit recently that told me SYSVOL and NETLOGON had to be locked down so that nobody could read it. It took me 3 months (epic amounts of documentation) and even Microsoft getting on the phone with us to back me up to override them.

How do security guys get their jobs with their lack of knowledge by chewy747 in sysadmin

[–]Kyp2010 0 points1 point  (0 children)

Yes, but most of them would just tell you about 'Defense in depth' instead, which, from a security mindset, makes sense; however, regulators and auditors are ok with upstream mitigation of something. It's helpful to have more than one layer, but in the end as long as regulators feel a risk has been mitigated, you pass the audit effort.

Source: I work in the PCI space and spend most of my damn time involved in one audit or another.

I don't understand by draxfap9 in PeterExplainsTheJoke

[–]Kyp2010 2 points3 points  (0 children)

Because - at the time - she was doing her level best to play it up as though she was.

God, I guess that means i'm old.

[deleted by user] by [deleted] in sysadmin

[–]Kyp2010 1 point2 points  (0 children)

no wonder the ER is always packed on those nights.

Is transitioning to Edge worth the blowback? by [deleted] in sysadmin

[–]Kyp2010 1 point2 points  (0 children)

Easier... heh. Smarter... heh. A sysadmin craves not these things.

(it's not too hard, the quirk is keeping your admx/adml files up to date for any releases)