Pop! Os
Imo.
Pop! Os
Imo.
What an unhinged rant. Even 30 seconds after posting I can barely understand my point. I’ll leave it there unedited though.
The root cause of this issue that they identify, is 100% the kind of AI that they’ll build for this situation.
Old mate wants to use it to keep people on their best behaviour. The kind of subjective wording that whatever he doesn’t like, is the exact reason people lie in court.
Power to that thought process through systemising it, legitimising it, is exactly part of the problem.
What’s that American who said lies about the eating cats then justifying it by saying “I’d lie if it got the American public to wake up”. Let me get the quote…
If I have to create stories so that the American media actually pays attention to the suffering of the American people, then that’s what I’m going to do.
Yep. It’s not infallible, it’s intentional. Intent goes into the creation of systems and implementations. These are the kind of people that want these systems. They’re justified in their own minds.
So to close the loop you linked that article and it’s point was:
More than half of wrongful convictions can be traced to witnesses who lied
Don’t give them reason for more ways to do so. Don’t give them legitimacy. That’s deterministic. It’s intent. It’s not failed if it worked. Your opinion on a system which is failed or fallible is not the same as the Oracle hocho who wants to be God.
They’re not sharing your values, morals, ethics or compassion.
I saw a sign on each street light on a bike path in my town that said “these street lights use aluminium cabling because the copper was stolen”.
Your plan will work.
Without a call to action, this is just an insult.
Bleeping computer was blocking my vpn but that also sounds common. Not only is there heaps of controls through conditional access policies where you can use device compliance policies and mass download defender for office 365 rules to detect these things, Microsoft also allow a bunch of ways to circumvent that through publishing enterprise apps and leave it to you not to lose your keys. I use one such app a lot called pnp powershell so my powershell can access basically everything and do anything so I can script largely migrations and audits of those migrations into sharepoint. While I do remove that app at the end of my projects, most people just move on.
Of course pure speculation. It’s just not even hard to either footgun yourself, and fortinet have been known to be shooting themselves in the foot, even assuming they tried to put controls in, in the first place.
I’ll read the actual article when I get home to see how impacted I will be though. As a customer, seller and with certifications. Not to mention, maybe there’s something for me to learn about the whole thing anyway.
I deploy so many of these things. I don’t even know what to say.
Fortinet as a security company is like asking a sieve to hold water.
The amount of cvss 10 scores show they’ve got the high score.
If they protect their own network with Fortigate devices no matter the utp atp whatever, they’ve probably been breached for a while.
Hard not to be cynical.
This is no different to me having a email dedicated to searching for a house to give to real estate agents and someone saying “I don’t think it’s legal that a house has an email”. It was frustrating reading up until your comment that people just didn’t get it.
Google looks. Google reports. Even if you did nothing wrong you’re guilty until you prove innocent and even then you’ll never get your account back.
Yeah as a sysadmin I’d also like to ensure casual readers note that windows 11 22h2 is EOL in Ends in 4 weeks (08 Oct 2024).
https://endoflife.date/windows
Please don’t run windows without security patches. Every month there’s about 4 active exploited zero day security vulnerabilities finally getting their patch. https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2024-patch-tuesday-fixes-4-zero-days-79-flaws/
Each month past end of security patch releases just grows your exposure. On Windows and Linux alike.
Coming in Windows 11 24h2 is live patch, Microsoft’s catch up to Linux (a decade late).
I spent like 20 minutes self hosting and running over tailscale so traffic is always private… Never had an issue. I’ve got over 20 devices accessible on it.
Easy to remote register over ssh just by sending the installer plus running with server name plus key, then setting a static password.
I still think gaming wide moonlight is great though. You won’t really regret that.
The hand-etched apology will not appear on the company’s actual devices come global launch
Luckily the article addresses this.
Other then legacy and uefi does it have a CSM compatibility support mode? An option to enable usb initialisation before bios? Eg wait for usb initialisation?
Some “boot faster” options kind of reorder boot initialisation to a point where it’s not holding the system back.
Though I’m really running out of suggestions… I can imagine you’re pretty frustrated. I know my Dell laptop was a pain to get the right settings to get usb to boot and the stupid 100db beep to silent on boot interruption.
And you probably confirmed that live boot worked too I assume.
In the actual bios, can you see a boot order and see uefi for Windows/whatever is on your internal disk? But not any other entries?
I suggest a few more things:
Try a different brand usb. Different motherboards sometimes don’t support some usb brands. In fact, a Lenovo server I rebuilt refused to boot off certain usbs.
Some motherboards don’t initialise boot off some usb ports. Sometimes the additional ports are on another controller and initialise too slow.
Just try a straight working Ubuntu live boot usb to remove any ventoy from equation. Ubuntu has real signed uefi (and no shim) granted by Microsoft. I think that’s how it works, uefi is a mess.
Try to start isolating all the different factors, and there could be more. It doesn’t necessarily mean anything definitive if it works on another machine.
I just asked google that exact question and it said “The current world population is 8,171,661,997”
The application yes, but the programmer? That requires network, api and a sent packet or more.
Just because you run a binary doesn’t mean a server across the Internet knows you.
Users though, disregard my advice. Assume what you run is running foreign remote code that could encrypt and ransom you.
Hmm, so, policy in our office is a clean desk. Before you jump to conclusions, it’s because our secured area and office occasionally has people come through that should absolutely not see what information we have on our desks. This requirement is a compliance issue for our continued contracts and certifications.
Our work from home policy hasn’t addressed this issue, but it sounds like it’s a clear gap. Your neighbour coming around for a cup of tea absolutely should not be able to see any work related information.
My assumption is that someone has considered this kind of aspect and had a check to confirm that they’ve done diligence by asking you to reveal your working space. A space the companies sensitive information would be visible. Actually you too should maybe not be looking at your wife’s screen nor materials on her work desk. Depending on the situation.
Either way, policy comes first so perhaps her employment agreement or employee handbook would reveal more.
It’s PKI, public key infrastructure. It’s secure so it’s used in many applications. Including ssh using keys.
I think you probably don’t realise you hate standards and certifications. No IT person wants yet another system generating more calls and complexity. but here is iso, or a cyber insurance policy, or NIST, or acsc asking minimums with checklists and a cyber review answering them with controls.
Crazy that there’s so little understanding about why it’s there, that you just think it’s the “IT guy” wanting those.