• 0 Posts
  • 31 Comments
Joined 1 year ago
cake
Cake day: July 22nd, 2023

help-circle



  • Also in the context of working, this isn’t just computers. It’s tools in general, and a computer is a type of tool. Problems with your saw? Problems with your batteries? Problems with access to electricity and your extension cords not being long enough? Problem with losing your 10mm sockets? If you’re a trucker or driver the problem could be your vehicle. Etc etc etc.

    This article is stupid. Tools break, they always have and always will. The tools we have now are better than they have ever been. They will probably keep getting more and more efficient, but they will still break. Because tools break.


  • Confusion like this got me my current job. They were looking for somebody with experience in “Microsoft Endpoint Configuration Manager”, and I look that up and I’m like “Oh, that’s SCCM, I do that”. Go through the interview process they keep asking me if I know Endpoint Configuration Manager and I’m like “yeah, for sure”. I get the job. Day one, the other systems engineer is like “here is the link to our Endpoint Manager Tenant”, and I’m like “oh… Shit I have never ever used this”

    Well… Ends up Endpoint Configuration Manager and Endpoint Manager are two different things. Fortunately for me they are pretty similar in function and rely on knowledge of Windows and Powershell, which I know.

    So my first 2 weeks of work was taking a shitload of courses in Endpoint Manager and watching a lot of videos and learning it inside and out.

    2 years later and I’m an Endpoint Manager/Intune pro.







  • I can wrap my head around the secret being stored in your device, but what happens when you go to a different device?

    Let’s say for example, I am at my friend’s house, and for one reason or another, I don’t have my phone. My Gmail account is passkey locked, but I need to check my email from my friend’s laptop. Would that require that I install passkey on their laptop, and log in to my passkey account? Does that also mean that if I forget to log out of passkey, they can access all of my accounts correlated with my passkey account? If that’s the case, what happens if my passkey account is compromised? All of my accounts are linked to a single point of failure?

    A friend of mine had to break out some kind of USB dongle to log into his Google account on a new machine the other day. Is that a form of passkey? What happens if that dongle gets lost/stolen/broken? Or what if you just forgot it at home? Are you SOL?

    I am all for more security and less password remembering, but I hop around a lot of computers.




  • I have this problem with ChatGPT and Powershell. It keeps referencing functions that do not exist inside of modules and when I’m like “that function doesn’t exist” its like “try reinstalling the module” and then I do and the function still isn’t there so I ask it for maybe another way to do it, and it just goes back to the first suggestion and it goes around in circles. ChatGPT works great sometimes, but honestly I still have more success with stack overflow




  • If anybody is curious, here are the details on how to do that: https://www.pdq.com/blog/how-to-block-the-windows-11-upgrade/

    If you want to take it a step further, write a Powershell script that checks that the registry entry is what you want it to be, and then changes it if it is not. Then create a scheduled task to run at login that runs the script. That way if/when Microsoft pushes an update that switches the registry entry back, the scheduled task will flip it back after installing updates/rebooting/logging in.

    I am currently fighting this battle with New Outlook in Win 11 23H2. It’s really annoying. I can get rid of it with registry entries, but when windows does updates it reverts the registry changes back. So scheduled task it is. It would be great if there was an Intune configuration profile to deal with this, but that would go against Microsoft’s current methods of shoving new products down your throat.


  • I will definitely check it out. A lot of what I have heard is from the podcast “Darknet Diaries”. I feel like it is pretty commonly known around here but, man… It exposed me to a lot of things that I did not know were going on. And that’s what is currently public information. What is not public information is probably way way worse. Another commenter below mentioned something about countries spying on countries, but what is currently happening in the digital warfare realm is way more than spying. As the OP article goes into, we are talking about attacks on infrastructure. That is not spying. The line needs to be drawn somewhere. Like… Attempted murder is a crime. Why is attempted hacking on infrastructure that would kill a bunch of people not a war crime?

    The concept of war is changing rapidly in the age of information. Why would you deploy boots on the ground when you can use technology to break down a country from the inside?


  • The whole “Is hacking an act of war?” thing needs to be seriously reconsidered. Of course, if the US decided it was, they would be guilty of so many acts of war. And it’s not just the US. Everybody is trying to hack everybody and acting like killing people by bringing down a power grid is somehow different than killing people by dropping a bomb. The outcome is the same: You did something that intentionally killed people.

    Of course saying that hacking is an act of war opens up a huge can of worms. Suddenly small time hackers are being charged with or framed for war crimes.

    It’s a delicate issue, but I think it is worth revisiting.