You are stuck on 100% accuracy and trying to actually stuff to death. The user asked if it’s possible to write an application in bash and the answer is an overwhelming duh. Most assembly languages are emulators and they all predate C. You are confidant, wrong and loud. Guess I struck a nerve when I called you out for needing a specific language.
2 parts:
script.sh
file, containing instructions to execute tasks. Before python was invented you used the basic shell because nothing else existed yetPretty much all languages are middleware, and most of the original code was shell/bash. All new employees in platform/devops want to immediately push their preferred language, they want java and rust environments. It’s a pretty safe bet if they insist on using a specific language; then they don’t know how awk or sed. Bash has all the tools you need, but good developers understand you write libraries for functionality that’s missing. Modern languages like Python have been widely adopted and has a friendlier onboarding and will save you time though.
Saw this guy’s post in another thread, he’s strawmanning because of lack of knowledge.
Oled model. Never got much more than an hour, but it depends on compute requirements. Imho it’s portable not wireless
Sounds like you don’t do contact negotiations, if someone will pay 2 million to appear on their root domain, you’ll sit down and figure it out for a couple hours.
Mostly customer provided certs, high end clients make all kinds of stupid requests like the aforementioned man-in-the-middle chain sniffers, clients that refuse DNS validation, clients that require alternate domains to be updated regularly. Management is fine for mywebsite.com, but how are you solving an EV on the spoofed root prod domain, with an sso cert chain for lower environments on internal traffic that is originally provided by a client? And do you want the cs reps emailing each other your root cert and (mistakingly) the key? I’ve been given since SCARY keys by clueless support engineers. I don’t want to do this every 3 months.
As someone who creates custom domain name applications, FUCK THEM WITH A PINEAPPLE SPIKY SIDE FIRST. This problem is on par with timezones for needless complexity and communication disasters. Companys and advertisers are now adding man in the middle certs for additional data collection/visibility. If the ciphers not cracked, changing the certs exposes significantly more failure, than letting one get a little stale.
Sysadmin used slam! It’s super effective!
At&t/pacbell basically just kept recombining after being repeatedly broken apart. The market is broken, not the company.
Hailey “Hawk Tuah” Welch is an influencer that gained a lot of popularity from her nickname (the sound of spitting, with HEAVY implications of performing fellacio). She used her platform to voice a very reasonable and intelligent opinion, which surprised a lot of people because her nickname is essentially blowjob queen.
One of her opinions is that it’s important to spread cyber security and used her fame to try to educate the public (potentially a fake story from the image? Idk this drama). And some xit-head claiming to be a cyber security expert ate the onion and offered some shitty advice. Proton fact checked them, because there are a ton of fake news stories about her right now.
You can prevent downtime by mirroring your container repository and keeping a cold stack in a different cloud service. We wrote an loe, decided the extra maintenance wasn’t worth the effort to plan for provider failures. But then providers only sign contracts if you are in their cloud and you end up doing it anyways.
Unfortunately most victims aren’t using best practices let alone industry standards. The author definitely learned the wrong lesson though.
Advanced classes, this student is likely pushing valedictorian/honors.
I just purchased a refurb 16g m1 air for $350 for myself for this exact reason. I hate the osx environment but it’s the best deal right now for a budget device and it doesn’t have windows. Linux doesn’t like the security chip but it’s not a blocker for cutting over you just need to disable a feature flag…
This is a complicated problem but the answer is likely ~socialism. The scenario you presenting is fix forward and try to retain the current economic status quo, which is imbalanced and rewards power and exploitation. We really should be living in a world where basic needs are guaranteed for everyone by a regulated market with multiple stakeholders keeping the process honest. Giving a single entity power generally doesn’t last longer than a generation or two.
I have yet to hear about bitwarden getting pwned
Honestly this is the part that scares me the most. Well maybe it’s the fact we have multiple plausible scenarios… What happens when you get locked out of bitwarden? I imagine the 256 randomized salted hash passwords will be hard to call, some companies will likely be able to restore your password via phone support. During that time, informed attackers will potentially have the master keys to your entire life. Fighting ai chatbots trying to recall security questions. During that time your phone and Internet service could be shut off, secondary emails changed and validated, money transferred out of bank accounts, stocks and crypto sold. Crowdstrike was a valuable security company.
You can’t grep dead trees, password managers are only as secure as their infrastructure which are constantly being backdoored, socially engineered and poorly administered. Anyone that trusts a simple security solution is a fool.
My rhcsa expired and I only have experience beyond that. Your task right now is to find a job and the easiest way to do that is to leverage your network. If you don’t have a network, you need to prove that you can commit to a long term plan and learn a skill. Most people do that with degrees. Unfortunately a lot of people have degrees and technology is getting more competitive. That’s where you see school competitions and certifications. If you don’t want to do that, you’ll need to be able to speak competently to the role.
Unfortunately right now I do not recommend platform/devops/sre for anyone breaking into the field. If I create an application today, it’s server less or bring your own dockerfile on a provided machine image. So what are you administrating? Legacy shops will be around for decades, but the future here is layered architecture not os tasks.
Wouldn’t the object need to be something of deep importance to the individual or be a poetic representation? I always assumed the volleyball was a symbol of everything he left behind. Things like recreation no longer mattered; only survival. :shrug: but I also thought the movie sounded incredibly boring. If you want a random item, go for qualities like “awkward to carry” or “gets hot when left in the sun”. Give your characters personality or force them to choose that object at a moment it’s inconvenient.
My boss had starlink and we used to joke that it was an elaborate plot to get out of meetings/awkward conversations.