Hi, I hope its appropriate to ask this here, considering this is the most active community closest to this topic (Networking). I am moving places shortly and will need to start from scratch will all networking equipment. Including router and wifi-extenders. Am wondering what the general consencus is around networking gear, what...
I would never use their firewalls/gateways, but their switches are pretty good for the price and their APs are decent (although tbh after 3 generations my next AP will likely be an enterprise Aruba).
That said, I still use Unifi in docker, everything is up to date, and nothing is requiring a sign-in to the cloud. Am I missing something? If it’s just the firewalls, then I’m not surprised since I’ve never been remotely tempted to use them, but it sure isn’t all of their devices.
I am a plebe who doesn’t understand these things but what exactly does cloudflare do? I see it popping up more and more often redirecting before visiting a site. I assume that this has something to do with bot traffic? It seems like every mention of cloudflare is about how it ruined someone’s day.
For context, I heard the term “Web 3.0” be used for the first time for everything being put on the blockchain. Then, it reminded me of a post on Mastodon saying that the fediverse is Web 3.0. After that I looked it up on the internet, and the definition included A.I. with crypto....
The definition I learned for web 2.0, as it was happening, was a shift from static web pages generated all at once on the server and delivered to the client whole, to using Ajax with in-browser Javascript dynamically changing already-delivered pages with back-end XML calls.
So my company decided to migrate office suite and email etc to Microsoft365. Whatever. But for 2FA login they decided to disable the option to choose “any authenticator” and force Microsoft Authenticator on the (private) phones of both employees and volunteers. Is there any valid reason why they would do this, like it’s...
This is incredibly well said and I agree 100%. I’ll just add that software TOTP is weaker than the MS Authenticator with number matching because the TOTP seed can still be intercepted and/or stolen by an attacker.
Ever notice that TOTP can be backed up and restored to a new device? If it can be transferred, then the device no longer counts for the “something you have” second factor in my threat model.
While I prefer pure phishing-resistant MFA methods (FIDO2, WHFB, or CBA), the support isn’t quite there yet for mobile devices (especially mobile browsers) so the MS Authenticator is the best alternative we have.
We can restrict the use of software TOTP, which is what companies are doing when they move users onto the MS Authenticator app.
Admins can’t control the other TOTP apps like Google Authenticator or Authy unless they go full MDM. And I don’t think someone worried about installing the MS Authenticator app is going to be happy about enrolling their phone in Intune.
Edit: And even then, there is no way to control or force users to use a managed device for software TOTP.
Look man, it’s okay to be wrong. It’s a natural part of growth.
But when you double down on your ignorance instead of taking the opportunity to open your mind and listen to the experts in the room, you just end up embarrassing yourself.
What is hard? Learning? Besides, you’re only proving our point. Samsung (and the market) have determined that the “one size” that people want is the one without an S-pen.
But go ahead and downvote based on your feelings rather than facts. None of you own a foldable anyway so it’s not like your opinions actually matter here.
Lol okay. Where was I defending Samsung? This all started with OP stating “the point of a samsung flagship is access to the S-pen” and “this defeats the purpose of a foldable” as if it was universal truth. It is not.
But that how most people on Lemmy are, at least in the tech communities. They have no concept of nuance and are completely unable to see other points of view. They were wrong. You aren’t even making coherent points. I am happily moving on.
And what’s wrong with asking that? Plenty of email platforms let you change your primary SMTP address and/or add/remove aliases.
It’s a legitimate question. And it could be that the lack of ability to change it has a perfectly logical answer. It still wouldn’t invalidate the question.
So this video explains how https works. What I don’t get is what if a hacker in the middle pretended to be the server and provided me with the box and the public key. wouldn’t he be able to decrypt the message with his private key? I’m not a tech expert, but just curious and trying to learn.
Just got an operating system update for my Galaxy S10 phone (fedia.io)
haven't gotten one of these in years, can't find any press about it, which i'm surprised by...
Networking Gear Recommendations? (starting from scratch)
Hi, I hope its appropriate to ask this here, considering this is the most active community closest to this topic (Networking). I am moving places shortly and will need to start from scratch will all networking equipment. Including router and wifi-extenders. Am wondering what the general consencus is around networking gear, what...
Life Pro Tip! (lemmy.zip)
Is cloudflare breaking the internet or fixing it?
I am a plebe who doesn’t understand these things but what exactly does cloudflare do? I see it popping up more and more often redirecting before visiting a site. I assume that this has something to do with bot traffic? It seems like every mention of cloudflare is about how it ruined someone’s day.
What is Web 3.0?
For context, I heard the term “Web 3.0” be used for the first time for everything being put on the blockchain. Then, it reminded me of a post on Mastodon saying that the fediverse is Web 3.0. After that I looked it up on the internet, and the definition included A.I. with crypto....
Can I refuse MS Authenticator?
So my company decided to migrate office suite and email etc to Microsoft365. Whatever. But for 2FA login they decided to disable the option to choose “any authenticator” and force Microsoft Authenticator on the (private) phones of both employees and volunteers. Is there any valid reason why they would do this, like it’s...
Vanity Fair France apologizes after editing out actor’s Palestinian flag pin (www.cnn.com)
Which stage of capitalism is this? (lemmy.world)
Finally, 3.5 Years After Launch, No One Is Working on Cyberpunk 2077 at CD Projekt (www.ign.com)
Wilburrrr (mander.xyz)
If Windows XP was released in 2024 (lemmy.world)
Credit: grimgreenfo.rest/notes/9tn7wtthrdb5013t
Galaxy Z Fold6 Slim (or Ultra) is coming alongside the Galaxy S25 series (www.gsmarena.com)
Usernames in the Fedivers 😫
Why can you never change your username in Mastodon, Lemmy or Peertube? Is it a condition introduced by ActivityPub or a forgotten feature?
The future is here (sh.itjust.works)
Why are we wasting our server bandwidth on shit takes? (midwest.social)
what if the hacker provided the public key for https connection? (www.youtube.com)
So this video explains how https works. What I don’t get is what if a hacker in the middle pretended to be the server and provided me with the box and the public key. wouldn’t he be able to decrypt the message with his private key? I’m not a tech expert, but just curious and trying to learn.
Life uh uh uh... finds a way. (lemmy.world)
I don’t even think there’s dirt in there. It’s an old birdbath with the top removed.