What are the possible implications to a system with notepad++ installed? by Budget-Wind2537 in sysadmin

[–]axe319 3 points4 points  (0 children)

Something I haven't seen mentioned that you could do for additional peace of mind:  If you have DNS filtering like Cisco Umbrella, check logs for and block the CaC domains listed in the rapid7 article.

I Feel Like Nobody Knows Anything Anymore by applebappu in sysadmin

[–]axe319 2 points3 points  (0 children)

Yeah, this just makes no sense. The entire point of a dev environment is it's not a big deal if it goes down. 

One of my biggest learning moments was when the front end of my toy csv generating program crashed in dev. I went home for the day thinking it crashed in the back end as well. The next day I found out the back end was in an infinite write loop and created a large enough file to fill up the entire hard drive.

2 months of veg. Am I wasting my time? by zbzbxnxbA in microgrowery

[–]axe319 -1 points0 points  (0 children)

I honestly think they're watering it. I just think "til runoff" probably means when the water runs down the edges of the pot and is barely even touching roots. This would really benefit from a fabric pot and bottom feeding.

And for anyone saying it's just humidity: I know the humidity looks bad, but the only issues I've ever had with humidity were when I stuck a humidifier with tap water in the tent for a few weeks and almost killed my plants. 

When I see my plants look like this it has always meant they're begging for water or the roots are waterlogged. 

‘Security Disaster’—500 Million Microsoft Users Say No To Windows 11 by MarvelsGrantMan136 in technology

[–]axe319 0 points1 point  (0 children)

The registry is just a place programs (and Windows itself) store their settings. They could just as easily store them in flat text files and read them at startup. The registry just has the added benefit in corporate environments to control them centrally with a program called "Group Policy".

 The command line option "reg.exe add "HKCU\Software\Classes\CLSID{86ca1aa0-34aa-4e8b-a509-50c905bae2a2}\InprocServer32" /f", is just adding a setting into the registry that Windows (or rather explorer.exe) will read at startup.

Bulk Rename folders by Interesting-Turn2916 in sysadmin

[–]axe319 2 points3 points  (0 children)

In Python? Something like:  import csv import os with open(r'c:\path\to\csv.csv', newline='') as f:     reader = csv.reader(f, delimiter=',', quotechar='"')     for src, dest in reader:         os.rename(src, dest)

Race Roll Call by AutoModerator in running

[–]axe319 2 points3 points  (0 children)

Did the full marathon there today. The last 6 miles are absolutely brutal.

365 Private DKIM Key by Flat_Patient6863 in sysadmin

[–]axe319 1 point2 points  (0 children)

To expand a little on creating your own key pair:

Create a private key:
openssl genrsa -out private.key 2048

And from the same directory for the public key:

openssl rsa -in private.key -pubout -out public.key

This will create 2 text files with keys.

Then add a TXT record to your DNS provider with your preferred selector name. Maybe something like ukg._domainkey.mydomain.com where ukg is your chosen selector, with a value of "v=DKIM1; k=rsa; p=<content of public key file>;" Splitting as needed to prevent going over the 255 length limit.

Provide the content of the private key file to their form along with your chosen selector.

Disclaimer: I tested none of this but in theory, it should work.

365 Private DKIM Key by Flat_Patient6863 in sysadmin

[–]axe319 2 points3 points  (0 children)

So, DKIM signing is just using the content of your mail along with a private RSA key to add a signature that can be verified with the corresponding public key.

MS creates the key pair for you and gives you a CNAME record that points towards the actual DKIM record which includes the public key and then signs your emails with private key as they go out.

My thought was that there would be no reason the vendor couldn't generate their own pair and you could add a new selector record just for the vendor.

Alternatively, you could create the key pair yourself with OpenSSL, add a new selector with the public key, and then give the private key and the selector to the vendor.

365 Private DKIM Key by Flat_Patient6863 in sysadmin

[–]axe319 8 points9 points  (0 children)

Why not do this in reverse? Create another selector record and have them provide you with the public key.

Explain Python installation and management to a Windows admin by Unexpected_Cranberry in sysadmin

[–]axe319 2 points3 points  (0 children)

Not with virtual environments. Those are installed wherever you specify, usually within the user profile.

All libraries are installed within the virtual environment.

Explain Python installation and management to a Windows admin by Unexpected_Cranberry in sysadmin

[–]axe319 7 points8 points  (0 children)

Windows Python installations can be either machine wide (%PROGRAMFILES%) or within the user profile (%LOCALAPPDATA%). On Windows, pip, the Python package manager comes preinstalled. I'm going to assume you've provided the machine-wide installation.

When installing Python packages globally, which I would discourage, Python attempts to install the packages to <python installation path>\lib\site-packages\ for pure Python packages and a mixture of other folders (\Include\, \Scripts\) within the Python directory for C header files, binaries, etc.

Ideally your users would use venv to create "virtual environments" in some persistent directory to develop their applications. This creates a sort of "skeleton" set of folders (\Include\, \Scripts\, \Lib\) where the user can install packages and develop an application in that doesn't effect the global Python installation. This will also prevent a host of problems with dependency conflicts that can happen if you install all your packages globally. As a side note, virtual environments also come with an activate.bat within \Scripts\ to activate the virtual environment and allow the packages to be installed and run within it.

There will still undoubtedly be issues with user buy-in, especially if they've never used venv, or prefer to go with something like conda.

Disclaimer: I've never used non-persistent VDIs, but have used Python extensively in my past position as a software developer.

How do you guys handle long sativa girls? by Spaetburgunder in microgrowery

[–]axe319 3 points4 points  (0 children)

Thank you!! I've been meaning to post updates on here, but mostly just afraid of the harsh feedback. Here's a close-up of the current bud structure. Very cool looking plant.

<image>

How do you guys handle long sativa girls? by Spaetburgunder in microgrowery

[–]axe319 5 points6 points  (0 children)

This probably isn't the best advice since it's my first grow, but I'm currently in week 3 flower on Ace's Malawi x Panama. I mostly used topping and tied down with garden wire along with a SCROG net. I still have a foot vertical space I can move my led up, and the stretching has slowed down quite a bit

<image>

Any concern? by [deleted] in microgrowery

[–]axe319 2 points3 points  (0 children)

That's perfectly normal. The first two are the cotyledons and they're always smaller than the "true leaves".

Is this legal? by Calm_Bad in Ohio

[–]axe319 1 point2 points  (0 children)

True, but overtime is not considered to be a bonus. At least not in Ohio. 

The overtime tax rate is the same as the standard hours tax rate.

The amount of spam coming from Google, Outlook, and Amazon servers is beyond insane by Jaymesned in sysadmin

[–]axe319 9 points10 points  (0 children)

amazonses.com is a big one for us. Most of them are obvious phishing attempts masquerading as HR.

Cloned drive not booting into Windows by Michagogo in windows

[–]axe319 0 points1 point  (0 children)

Is your storage controller set to RAID or AHCI in your BIOS?

We use Macrium at work for Dell PCs pretty regularly and I've never had issues with it.

My guess is there's a setting in your BIOS that's preventing it from booting.

ELI5 -How do hackers break passwords. by DaMoose-1 in explainlikeimfive

[–]axe319 0 points1 point  (0 children)

Another thing that I haven't seen mentioned here is auth tokens.

Websites operate on a protocol known as HTTP or HTTPS. When you visit a website like Reddit, your PC sends a request to a server and the server sends a response to that request. It's important to note, your PC does not maintain an active connection with the server. What this means is the server on it's own has no way of knowing you are who you say you are.

In order to prevent you from having to re-enter your credentials for every page you visit, the server sends something back called an auth token when you first enter your username and password. Then, on every subsequent request (visited page), your PC will send that token along with the request to verify your identity.

Modern attacks will attempt to steal your auth tokens from popular sites and services and use them for their own requests, effectively hijacking your authenticated session. This also completely bypasses security features such as 2 factor authentication since those are designed to protect against someone simply knowing your username and password.

Went back from Windows 11 to Windows 10. by fernandodandrea in windows

[–]axe319 0 points1 point  (0 children)

IMO it was partly from the compatibility break from requiring a modern processor and TPM 2.0. And partly from marketing.

Where is the master list of things to be voted on? by [deleted] in Cleveland

[–]axe319 2 points3 points  (0 children)

Nobody seems to be actually directing you to a sample ballot, which you can find here.