Some IT guy, IDK.

  • 1 Post
  • 147 Comments
Joined 1 year ago
cake
Cake day: June 5th, 2023

help-circle
  • I agree with the idea of bodily autonomy. Above all, someone should have the right to do, or not do, whatever they want with their own person.

    Whether that is to listen to doctors advice, buy pharmaceuticals and self-administer as prescribed, or even end your own life, and everything in between.

    Quick disclaimer, suicide should still be evaluated by a psychiatric professional, and simply being suicidal shouldn’t necessarily mean that nobody can, or should stop you from committing that act. I’m mostly referring to medically assisted self termination, after the appropriate safeguards, checks, and balances have been cleared. Simply wanting to off yourself without being cleared as having sound mind should be something we, as a society, should address carefully, with the assistance of mental health professionals.

    With all that being said: I probably would DIY some pharmaceuticals. Anything that’s an opiate or other restricted substance, definitely not. But if I can buy the ingredients without needing a special permit or license, I definitely would.


  • Something I’ve noticed with institutional education is that they’re not looking for the factually correct answer, they’re looking for the answer that matches whatever you were told in class. Those two things should not be different, but in my experience, they’re not always the same thing.

    I have no idea if this is a factor here, but it’s something I’ve noticed. I have actually answered questions with a factually wrong answer, because that’s what was taught, just to get the marks.



  • There’s actually an argument that makes the point of driving prices down with soldered RAM.

    The individual memory chips and constituent components are cheaper than they would be for the same in a DIMM. We’re talking about a very small difference, and bluntly, OEMs are going to mark it up significantly enough that the end consumer won’t see a reduction for this (but OEMs will see additional profits).

    So by making it into unupgradable ewaste, they make an extra buck or two per unit, with the added benefit of our being unupgradable ewaste, so you throw it out and buy a whole new system sooner.

    This harkens back to my rant on thin and light phones, where the main point is that they’re racing to the bottom. Same thing here. For thin and light mobile systems, soldered RAM still saves precious space and weight, allowing for it to be thinner and lighter (again, by a very small margin)… That’s the only market segment I kind of understand the practice. For everything else, DIMMs (or the upcoming LPCAMM2)… IMO, I’d rather sacrifice any speed benefit to have the ability to upgrade the RAM.

    The one that ticks me off is the underpowered thin/lights that are basically unusable ewaste because they have the equivalent of a Celeron, and barely enough RAM to run the OS they’re designed for. Everything is soldered, and they’re cheap, so people on a tight budget are screwed into buying them. This is actually a big reason why I’m hoping that the windows-on-ARM thing takes off a bit, because those systems would be far more useful than the budget x86 chips we’ve seen, and far less expensive than anything from Intel or AMD that’s designed for mobile use. People on a tight budget can get a cheap system that’s actually not ewaste.






  • Yep. I work in IT support, almost entirely Windows but similar concepts apply.

    I see people pushing 6G+ with the OS and remote desktop applications open sometimes. My current shop does almost everything by VDI/remote desktop… So that’s literally the only thing they need to load, it’s just not good.

    On the remote desktop side, we recently shifted from a balanced remote desktop server, over to a “memory optimised” VM, basically has more RAM but the same or similar CPU, because we kept running out of RAM for users, even though there was plenty of CPU available… It caused problems.

    Memory is continually getting more important.

    When I do the math on the bandwidth requirements to run everything, the next limit I think we’re likely to hit is RAM access speed and bandwidth. We’re just dealing with so much RAM at this point that the available bandwidth from the CPU to the RAM is less than the total memory allocation for the virtual system. Eg: 256G for the VM, and the CPU runs at, say, 288GB/s…

    Luckily DDR 4/5 brings improvements here, though a lot of that stuff has yet to filter into datacenters


  • This is less than interesting.

    ISPs don’t want to cut off their income here. I’m certain they have a very good idea of how many of their customers, especially those paying for higher tier plans, are either getting constant DMCA requests, or have a persistent connection to a VPN service. They have a good idea of how much money they’re making from people pirating content, so this position for them is hardly surprising.

    At the same time, I’d rather they fight with the copyright trolls than me. Regardless of the reason for why they’re doing it, it’s a good thing to fight for.

    IMO, they shouldn’t be responsible for this because they’re not tasked with enforcing laws. They must abide by them, and they have a legal, or at least, moral obligation to report any felonies/crimes that they’re aware of (with varying degrees of obligation depending on the severity of the crime. Eg, I’m less bothered if they don’t report, say, piracy, than I would be if they don’t report CP/murder/violent crimes, etc).

    If the LEO’s want a service cut off for a good reason, then let them get a court order for it. They should not be obligated by law to enforce such laws. Any enforcement should be handled by an independent organization, and be filtered through the court system as a check/balance for the whole cabal. They shouldn’t be forced to both find and enforce infractions. Reporting suspected infractions, maybe. Forwarding legal requests to customers, sure (like DMCA notices). Oblige disconnect requests from law enforcement by request (when confirmed necessary by courts in the presence of reasonable evidence), absolutely.

    But having the ISPs do all that themselves with little oversight, is both a danger to their clients, to their liability, and to the public at large, mainly in the context of free speech. The ISP is just the middle man, the messenger. They don’t host the content, nor should they police it, or the access you can get to it. I’m all for collaboration in the interest of enforcing the law, but putting the entire obligation on the ISP seems foolish to me.

    Cyber crimes is one area of law enforcement that I don’t think should be defunded. It may be that ACAB, but those doing the investigative work, away from public interaction (and possible abuse), are not the root of the problem there.

    I dunno, just my opinion man.


  • This has been happening for a lot longer than just Windows 11.

    Several people I’ve spoken to, who have purchased OEM computers from the likes of Dell, HP, Lenovo and others, did not know that bitlocker FDE was enabled, and they were not aware that they needed to back up their recovery key.

    On at least one occasion, this caused someone to lose the contents of their laptop when Windows failed to finish booting into the OS. The drive was fine as far as I could tell, but the content on the drive would not complete the boot up sequence and would bsod/boot loop the system, so data retrieval was not possible without the recovery key, which they did not have. That was a Windows 10 Dell system from 2020 or so.

    My opinion is that FDE is a good thing.

    My advice is if you have FDE enabled, backup your recovery keys. It’s easy, but it won’t directly save to a file on the filesystem that’s locked by the key to which the recovery key applies. The easiest workaround is to “print” it, then use the built in Microsoft print to PDF, then dump it wherever you want. Afterwards, put it somewhere safe. Doesn’t matter where, but anywhere that isn’t the encrypted drive. Maybe Google drive, maybe a USB flash drive, maybe email it to yourself. I dunno, just somewhere you can retrieve if that system isn’t working.

    When you’re done doing that, go check the same on your parents computers, friends, brothers and sisters… If they’re someone you care about, and they have a windows computer, check. Get those recovery keys backed up somewhere.



  • It’s lady gaga.

    If you’ve followed her at all, even indirectly, this is NOT the weirdest thing she’s done, and bluntly, the weirder stuff wasn’t justified (to the public at least).

    I’m not trying to throw shade at Gaga at all. Lady, let your freak flag fly all day long. You don’t need my permission to do it, but if you want it, you got it. Weird isn’t bad, it’s just weird.

    IMO, at this point, gaga doesn’t need a reason to be weird.



  • You can do whatever you want. Don’t let anyone tell you it’s “wrong”. A big part of homelabbing is to try stuff. If it doesn’t work, that’s fine, you learned something, and that was the point.

    For me, I don’t see a UPS as essential. It’s generally a good idea, but not strictly essential. My servers are on 24/7, because I have services that do things overnight for me. I also know that some people access my lab when I’m not awake, so I just leave it on so it can be ready for anything at any time. It poses some unique challenges sometimes when running stuff that’s basically 24/7/365.

    Be safe, have fun, learn stuff.


  • Yep, there’s actually quite a few more than what I mentioned, if you get into the advanced dialogs.

    IMO, it’s unnecessarily complicated, but given that NTFS is used for network file sharing in large companies, I get why it’s so crazy. They probably demand those kinds of granular permissions.

    I know Linux is a lot simpler. Just read/write/execute, and a single group, single owner, and a setting for “everyone else” kind of thing, which is generally sufficient for 90% of use cases.


  • I’m a sysadmin and I work with Windows a lot.

    The short version is that only the users granted permission to a given set of files can access those files. With NTFS permissions it’s… Complicated. You can have explicit permission to a file, or implied permission via a group that you’re a part of, or some combination of those things. You can also have read, but no write. You can have append but not create, you can have delete, but not list. It’s a lot of very granular, very crazy permissions.

    There’s also deny permissions which overrule everything.

    What has likely happened is that the posters user account doesn’t have implied or explicit permission to the file, but if you sign in as an administrator, even if the administrator doesn’t have permission to read/write/append/delete the file, the administrator has permission to take ownership of a file, and as owner, change the permissions of a file. Being owner doesn’t mean you can open/read/write/append/delete anything, you can just change permissions and give yourself (or anyone else) permissions to the file.

    Changing ownership is a right which, as far as I’m aware, cannot be revoked from admin level users. They can always change ownership. Owners of files cannot be denied the right to change the permissions of a file as far as I know. This will always result in some method by which administrative level accounts can recover access to files and folders.

    In my experience, exceptions exist but are extremely rare (usually to do with kernel level stuff, and/or lockouts by security/AV software).

    The poster might legally and physically own the device and all the data contained therein, and may have an administrative level account on that device, but the fact is, their NTFS permissions are not set to allow them access to the data. The post they’re replying to is trying to let them know how to fix it by using an administrative level account and they’re not tech-savvy enough to follow along.

    I don’t blame them. File permissions issues are challenging even for me, and I fully understand the problem.


  • That’s quite the lesson you just laid down.

    It’s actually made things a lot more clear for me. To put it as tersely as I can, UTC is the international time, GMT is a timezone, which also happens to be UTC+0.

    So GMT is a place/zone/region of earth, and UTC is a time coordination, with no physical location (beyond the prime meridian, which is where it is tracking the time of).

    Awesome.


  • IMO, the biggest problem with timezones is that the people who initially created them were fairly short sighted.

    That and there have been way too many changes to who lives in what timezone. The one that boggles my mind is that apparently there’s a country in two timezones, not like, split down the middle or anything, but two active timezones across the entire country depending on which culture you’re a part of, or something. It’s wild.

    I still don’t know if there’s any difference between GMT and UTC. I couldn’t find one. They both have the same time, same offset (+0), and represent the same time zone area.

    I use UTC because I’m in tech, and I can’t stand time formats, so I exclusively use ISO 8601, with a 24 hour clock. Usually in my local time zone, via UTC. We have DST here which I’m not a fan of, but I have to abide by because everyone else does.

    My biggest issues with time and timezones is that everyone uses different standards. It drives me nuts when software doesn’t let me set the standard for how the time and date is displayed, and doesn’t follow the system settings. It’s more common in web apps, but it happens a lot. I put in a lot of effort to try to get everything displaying in a standard format then some crudely written website is just mm/dd/yy with 12h clock and no timezone info, and there’s nothing you can do about it.


  • I’m generally more of a Debian user, when I use Linux at least, so anything red hat based doesn’t even occur to me to recommend. I generally don’t get involved in distro discussions though.

    My main interaction with Linux is Ubuntu server, and that’s where my knowledge generally is. I can’t really fix issues in redhat, so if someone is using it, I’m mostly lost on how to fix it.

    There’s enough difference in how redhat works compared to Debian distributions that I would need to do a lot of work to understand what’s happening and fix any problems.