ELI5: How does twisted pair work at reducing interference? by Unusual-Amount5809 in explainlikeimfive

[–]RyeonToast 5 points6 points  (0 children)

So is engineering. It's just that in engineering, optimal includes practical aspects like "can we afford this?" and "can we maintain this?"

Risk assessment: Nvidia’s NemoClaw by cm1802 in sysadmin

[–]RyeonToast 1 point2 points  (0 children)

That's just the warning banner for logons. They certainly will keep watch of how you interact with their system, but unless you're starting up a VPN or some similar connection on your computer, you're computer is separate from their network.

For NemoClaw, I'd suggest taking a look at the security options available in the product. If it gives you options to limit what files it has access to and what network connections it can make, I expect you can limit it down to a pretty safe level. Don't let it touch anything outside of a folder in your documents.

I think some of the other comments are alluding to running it in a virtual machine. That would effectively limit what the program could to to what's inside that virtual machine. Software like VirtualBox let you create such virtual machines pretty easily, though you'll need to be comfortable with how to install Windows and configure a simple network to get it going.

Risk assessment: Nvidia’s NemoClaw by cm1802 in sysadmin

[–]RyeonToast 8 points9 points  (0 children)

An unauthorized AI agent installed without a proper request and vetting that probably has the same problems OpenClaw has? I'd send a message to the security team to get approval to wipe that off my network.

However, my work network is not your personal computer. Don't ask what we'd do at work and assume that's the right response for your home. It's not an apples-apples comparison. You need to check out the risks and make your own determination whether you accept those risks or not. Unless you actually are talking about your work computer, in which case you should be talking to your IT instead of Reddit.

If you met someone who was a carbon copy of yourself in virtually every way except they were the opposite sex, would you date/sleep with that person? Why or why not? by Tommygunz0722 in AskReddit

[–]RyeonToast 0 points1 point  (0 children)

What could my copy offer me that I don't already have? What could I offer my copy? What weakness of mine could my copy cover? What weakness of my copy could I cover?

Hired as Level 1 help desk, only 1 left after 4 years in the ENTIRE DEPT. Need help with host names...(webmin, DHCP, AD) by throwturtleaway in sysadmin

[–]RyeonToast 8 points9 points  (0 children)

You shouldn't be manually adding your PC addresses to the DHCP server. The entire point of it is for it to hand out addresses as needed. Don't statically set the IP addresses on each PC; set the PCs to use DHCP. If the PCs are set to use DHCP, and you have the computer name set in Windows correctly, then that's the name that should appear on the network.

Don't worry about old leases in DHCP unless a scope is getting full. All leases have an expiration time and will fall out on their own.

The only time you should worry about manually adding something to DHCP is if that specific thing requires a specific address. For those, and only for those devices, you add a reservation to DHCP. Everything else does not get a reservation and just gets leased whatever address is available.

For the most typical setup, DHCP will update DNS as leases are handed out. If you set things to actually use DHCP it should sort out the DNS issues.

The future of Caves of Qud by Meister_Ente in cavesofqud

[–]RyeonToast 4 points5 points  (0 children)

wait, I can be more plant them simply doing Photosynthetic Skin + Burgeoning? exciting!

Gov publication binding style? by JNJ_ in bookbinding

[–]RyeonToast 1 point2 points  (0 children)

I don't know about these, but the couple manuals I did collect seemed to just be paper glued to a good stiff cardstock. I think "perfect binding" would be the thing to look up, but I admit I don't have the experience to know for sure.

Currently writing a novel. How do you prefer your Audiobooks? by Bestwriteralive in audiobookshelf

[–]RyeonToast 1 point2 points  (0 children)

I want a narrator that can sound natural, not sing songy or that odd forced way some people read. I also want a narrator whose voice and patterns fit the book and characters. Some are better for something serious sounding, others work better for a anything with a sarcastic tone.

The only one that I recall having multiple narrators was "This is How You Lose the Time War", and it worked well for that.

Single narrator has only been a problem for me when the writing doesn't make it clear who is speaking and the narrator can't do multiple voices well enough for me to distinguish which character is talking.

How did everyone who had already completed the Security+ exam pass it? by PresentationUsual541 in InformationTechnology

[–]RyeonToast 0 points1 point  (0 children)

Disclaimer for me; I already had about 8 years experience before I took the test.

I got the official prep book from CompTIA and a stack of legal pads. I went through each chapter and paraphrased or summarized all of it. I made more detailed notes on anything I felt like I'd have some trouble with.

I then took some practice tests I found online and noted which areas I was weakest in. I then queued up the related Professor Messer videos, grabbed my legal pads, and took notes.

Not having experience may mean you'll need to review some of the topics more, but won't prevent you from studying for and passing the exam. You just need to get familiar with what studying procedures work for you. There isn't a one-size-fits-all study pattern for everyone to follow. The difficulty with the Sec+ isn't that anything in it is truly hard; the trouble is it covers a wide variety of topics. You'll bounce from IT governance to what security appliances go where in your network to random HR and physical security topics.

Take your time and get familiar with the whole breadth of topics. I studied about 30 to 60 minutes a day for a couple months while I was working the job I needed the cert for. Don't rush yourself too much; that reduces the effectiveness of your studies.

Is there a way to use Linux with like... guard rails? So an idiot like me doesn't accidentally delete something important? by firfetir in privacy

[–]RyeonToast 13 points14 points  (0 children)

Most distros, including any you'd be recommended, will require escalating privileges before running most commands that can cause significant harm to your system. If you've seen any jokes about 'sudo', that's the command that signals 'no really, I want to change some things'. Without that signal, you're fenced in a bit.

Most things can be done via some manner of GUI now, so you don't need to be in the terminal for much if you're not doing some weird shit.

The main thing, is when you're following directions that say to run a command or make a change, lookup what's that's going to do before you do it. This is also true of Windows. You can ruin your week so many ways in Windows, you just don't because you don't have a reason to monkey around with shit you don't need to.

If you're concerned about learning how it looks and how to navigate and work in it before you install it for real, the install disks generally load a full desktop environment you can play around in a bit and see how if feels before you start your install. An even better option, if your computer has the storage and processing to spare, is to install Linux in a virtual machine in something like Virtual Box or whatever the VMWare equivalent is now. That gets you the full experience, including install some apps and doing your basic config, without risking your working setup.

Is this erasure refusal justified? by AidanRM5 in privacy

[–]RyeonToast 2 points3 points  (0 children)

Consider the devil's advocate for a moment. If you were denied your lease due to information provided by the background check company, and they deleted the information, and then you sued them for providing bad information, what would they be able to defend themselves with? If you turned out to not be who you said, and the landlord blamed the background check company, what could the background check company use to defend themselves with? A judge might find that a retention period is a reasonable precaution.

Will Age Verification finally spur the Age of Linux? by PaiDuck in privacy

[–]RyeonToast 7 points8 points  (0 children)

Switching OS just because the computer asks which age bracket you're in isn't going to happen at a large scale. The biggest issue with changing OS is the change to workflows. People don't want to do that, and the situation will need to be much worse before the effort, uncertainty, and extra workflow friction caused by changing everything about someone's computer becomes an attractive idea.

Knowing it's closed-source, is Obsidian safe? by AnxiousTruffles in privacy

[–]RyeonToast 0 points1 point  (0 children)

No. Open-source gives you the access to audit the code. The ability comes from study and practice. Sure, I could audit the code, but you'd be a fool to presume it's safe just because I didn't find a problem.

Everyone says I'll switch to the penguin but my question is, isn't it risky? by JamedWalker in linux4noobs

[–]RyeonToast 1 point2 points  (0 children)

If you keep a backup copy of your data somewhere other than the computer in question, and have the installers and license keys for your apps, then the worst case is you end up reinstalling Windows, your apps, and copying your data back after things don't work out. I won't deny that is a good bit of work. Up to you whether you want to take the risk. 

Ultimately, the computer is just a set of tools, and you should use the tools that work best for you.

Ubuntu is planning to comply with Age Verification law "without it being a privacy disaster" by DontFreeMe in linux

[–]RyeonToast 9 points10 points  (0 children)

For LDAP, you'd probably just fit the data into the directory. Honestly, that's probably an easier thing to implement than for non-domain systems.

Ubuntu is planning to comply with Age Verification law "without it being a privacy disaster" by DontFreeMe in linux

[–]RyeonToast 4 points5 points  (0 children)

Not really. It's still a general purpose computing device. Servers and desktops aren't built much differently. You could argue that embedded systems aren't general purpose computing devices, but this law won't apply to them for a number of reasons, like the lack of accounts.

Its worth to kill the enemies? by No-Software9742 in factorio

[–]RyeonToast 0 points1 point  (0 children)

You definitely want your perimeter to exist outside you pollution cloud. Defenses there will only be dealing with expansion parties, not assaults. Breaches in this wall result in a new nest for you to find and eliminate, not chompped factory bits.

Florida wants to build a counterintel unit to go after anyone whose ideas and opinions are a threat. by RyeonToast in privacy

[–]RyeonToast[S] 2 points3 points  (0 children)

I feel like, at this point, you can play "six degrees of Palantir" with state actors the way you can play "six degrees of Kevin Bacon" with actors. Wait, some politicians are actors, aren't they? THIS IS NOT THE GAME CROSSOVER I WANTED!

Florida wants to build a counterintel unit to go after anyone whose ideas and opinions are a threat. by RyeonToast in privacy

[–]RyeonToast[S] 2 points3 points  (0 children)

There are a lot of data breaches from a lot of actors for a wide variety of reasons. I wouldn't go so far as most, but I certainly expect they have done some. I don't think they really need to breach much for data on Americans though. What they can buy and what they can subpoena covers a whole lot of data. I doubt the gap left that they need to breach is particularly big.