sorted by: new top controversial old
[-] distractedcactus@beehaw.org 12 points 1 year ago

Your ISP controls what ports you can access using one or more firewalls and traffic control devices somewhere past the point where you connect to their network.

They can block whatever ports they want. The only way around this is to use a VPN, which creates a tunnel directly from your device to a remote server to route traffic. This still goes through your ISP and whatever firewall they have but does so over a port that they (probably) don't block. They can't see what ports your web or network requests are using so they can't block it directly.

Depending on your technical know how and what type of router you have, you could set up a VPN at the device level (PC, phone, etc.) to send just requests from that device or at the router level which could send all traffic from your network through the VPN.

It's important to remember when using a VPN that the VPN servers can still see (and potentially log) all of your traffic, even if your ISP cannot. You still need to find a VPN service that you trust to not monitor your traffic.

[-] distractedcactus@beehaw.org 2 points 1 year ago

I think this idea could be true for some businesses, primarily those that only use their endpoints (laptops) for simple documentation tasks and/or as gateways to web-based tools. However, in addition to "user demand" there needs to be an adequate business case ($$ savings) plus enough technical knowledge on the IT implementation side to made the move. I've worked in shops moving from a large Microsoft Windows footprint to Apple products and it is not always an easy transition, even with tools like Jamf.

Since companies will still have to rely on a Windows- or Linux-based backend (on prem or cloud) they'll need admins that can handle integrating those macOS and iOS devices into their MDM systems alongside the Windows systems. There are also a lot of users out there who may have no experience with using a Mac, either for personal or business use, that will need re-training to use a Mac laptop. Both integration / transition of systems and users will introduce delays and downtime into a company's business processes, increasing the cost to transition.

None of the above is a reason not to move from Microsoft to Apple, but it's definitely not a simple process and that can lead to slow (or no) transitions for large businesses, no matter how many users ask for it.

10

Caught these two in some hanky panky. Photo is blurry due to zooming in so I wouldn't disturb them. My hydrangea have overgrown this year and I've also noticed an unusual number of lizards around my yard. Seems the two are related.

[-] distractedcactus@beehaw.org 1 points 1 year ago

Dangerous in what way? According to the article:

The panel cited the long history of safety and efficacy of Opill, which was approved for prescription use 50 years ago. The over-the-counter pill will be identical to the prescription version, which is 93 percent effective at preventing pregnancy with typical use.

1
submitted 1 year ago* (last edited 1 year ago) by distractedcactus@beehaw.org to c/technology@beehaw.org

I recently listened to a "tech" podcast host drone on for 45 minutes about the "Elon vs Zuck" cage match and this piece perfectly captures the frothing, screaming stream-of-conciousness in my brain at the thought of seeing another discussion about Twitter vs Threads/Insta/Face/burning-sh*itpile. I felt some small amount of catharsis just from reading.

[-] distractedcactus@beehaw.org -1 points 1 year ago

Modal or bamboo underwear - soft, stretchy, silky, the solution to everything I hated about cotton underwear. They are usually more expensive than Walmart (or other box store) brands and take more care when washing, but to me are definitely worth it. You can find them for fairly good prices on Amazon if you don't want to splurge on name brands, but you have to do the research and check the reviews. You can get them in boxers, briefs, and thongs for men and even more styles for women.

[-] distractedcactus@beehaw.org 0 points 1 year ago

This is good advice if your phone is actively being hacked in real time when you turn it off. Otherwise all you're doing is delaying or temporarily interrupting any data collection that's going on in the background. Any apps that are sophisticated enough to run undetected by a normal user are also going to restart themselves as soon as the phone boots up again.

Also, if you are being targeted by a hacker that is knowledgeable enough to actively get into your device (especially an iPhone) without physical access then you're better off destroying it and buying a new one, along with doing a full reset of all of your passwords, 2FA setup, and anything else you think you're relying on for "security".

distractedcactus

joined 1 year ago