• 0 Posts
  • 22 Comments
Joined 1 year ago
cake
Cake day: July 11th, 2023

help-circle


  • Hey so it seems like you don’t really get licensing or ‘too expensive’ is just business speak for wanting it done free.

    Exchange plan 1 licenses are minimally very very small licenses, but you can get even cheaper. You can even get exchange kiosk. Kiosk isn’t designed for users, it’s designed for things like an MFP then you’re allowed to relay with an authenticated startTLS account setup on the MFP to connect to exchange Online.

    However, if you don’t use an authenticated account, you can still send internally. That way your inevitable compromised device doesn’t spam the world with mail throttle Microsoft servers. However you can scan to your own internal staff. And by internal staff I’m guessing at more and more here but I’m betting you have two mail domains. Only domains in your exchange Online Admin centre which are added into the domains, will be ‘internal’.

    If you wanted hybrid you should do hybrid using the hybrid configuration wizard and it will connect your on premises exchange to your exchange Online using mail transports. You need to fix up a bunch of things to get that connected. But doing so will count the mailboxes which are on premise as ‘internal’ and unauthenticated mail will be allowed to relay to them.

    But 40 exchange online only accounts with exchange plan 1 is hardly a few seconds of wage time per month in costs.

    I’m guessing a lot here, but you said you have two different mail servers currently, online and on premise, I can only assume you’ve either got two different mail domains otherwise MX routing would be dead to one or the other. And I guess that because you said you’re getting errors that only happen when you send mail to external users.

    So…


  • Is the copied file going to a usb? Is the usb fake? Otherwise I’m pretty sure your source is bad. Probably the disk sector if you’re sure the file was at some point complete.

    Something like btrfs probably does block cloning or similar so a copy to the same disk probably just points at the same disk blocks as the original.

    ffmpeg -v error -i file.avi -f null - 2>error.log

    Check the source probably




  • Snowplow8861@lemmus.orgtoLinux@lemmy.mlArcGis Pro in Wine?
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    Mm, not quite, when say having 60+staff work in a single building model you need something that allows object locking so stag can work on part of a building and check it in and out.

    I’m not the architect, I’m the sysadmin that designs and builds the server/network infrastructure for a half dozen architecture firms, some which have over 300 architects spread around Australia, Europe, and south East Asia. That mostly means running up servers to host BIM and BIM cache servers, as well as maintaining PIM servers.

    To be honest I quizzed you because I honestly never heard of it and my life revolves around both revit and bim360, revit and revit self hosted bim servers, or archicad. Not that I do anything much in them, BIM managers generally administrate their own BIM instances and their teams. But some of the projects are in the billions of dollars that you’ll find on featured on the b1m YouTube channel.

    Id argue that while the architects themselves are by and far the largest cost, the largest IT cost is the modelling software. I’ve even had some people using unreal engine to do parts of their work now especially for customer facing flythrough demonstrations and city view with time of day and all that.

    So I’m pretty open minded to keeping my ears open to new software since I’m never sure what to expect. It would be interesting to see if it could ever be possible to do one of these megaprojects in open source. But my gut says it’s unlikely.



  • Bring free on cloudflare makes it widely adopted quickly likely.

    It’s also going to break all the firewalls at work which will no longer be able to do dns and http filtering based on set categories like phishing, malware, gore, and porn. I wish I didn’t need to block these things, but users can’t be trusted and not everyone is happy seeing porn and gore on their co-workers screens!

    The malware and other malicious site blocking though is me. At every turn users will click the google prompted ad sites, just like the keepass one this week.

    Anyway all that’s likely to not work now! I guess all that’s left is to break encryption by adding true mitm with installing certificates on everyone’s machines and making it a proxy. Something I was loathe to do.



  • Yes, but first go check which list you want to use since they’re a good starting point to understand a kind of level of tolerance and expectations around your experience.

    There’s lots of lists around here’s a small sample:
    https://arstech.net/pi-hole-blocking-lists-2023/

    Be prepared for a bump in time outs as you work through things you might need (I blocked by accident a bunch of needed Microsoft services that I need to use during my job).

    I haven’t edited my white list in months, maybe over a year. It’s going very well. I’ve been running pihole on ubuntu for more than 5 years as two virtual machines. I’m happy.






  • Stupid take to be honest, real people getting trafficked and stalked, domestic abuse victims being tracked for control by the abuser, and you think that’s fine because google has that data about you even though nobody can use it so why shouldn’t all apps be able to? Go to a women’s shelter, touch grass.

    This issue is far more nuanced. No it’s not good Google has that data on you.

    No it’s not fair that automatons caused a small developer to have their entire amount destroyed without a proper review.

    Both things can be true.


  • Hi, I run pop! Os for about a year on a mac book pro 2012. My biggest hassles are Bluetooth audio sucks (glitchy) and I had to install a wireless driver to get wireless to work at all. Other than that, it’s working exactly as expected. Can recommend. It can’t game, it can’t play videos well because the inbuilt speakers suck (and the Bluetooth audio is glitchy), but it’s plenty performant for my actual tasks. Runs smooth. I’m sure most distributions will.



  • I can guess at some things but let me first start with what I think is happening:

    You have a gateway set. Your device sends a broadcast arp message asking 'who has ip ’ and the device with that ip is supposed to send back ‘me with this mac address!’.

    That device is either sending it so slowly that your machine says ‘I can’t go past the gateway, the gateway isn’t responding’ which in your error message is no route to host.

    Assuming that you have no custom manual network route in play.

    So things that can cause that are usually link layer and layer two issues and sometimes duplicate IPs. Two devices with the gateway ip.

    You should watch your mac address table and arp table (arp a) and watch if the router gateway disappears or changes Mac addresses.


  • Don’t feel bad because you’re really good at using a tool that doesn’t follow your values. I use Windows during the work week and I use Linux for gaming on the weekend where I literally can’t work even if I wanted to.

    For me Windows is a tool box with propriatry tools that have no Linux compatibility. That’s OK for me. People get emotionally invested but that’s neither healthy nor helpful. No point being angry at work, it’s like being angry that your work uniform is made by one textiles vendor not the other.

    You get to choose what you use at home in your own time. If you feel good using Linux then, do it!