Slacklinejoe
Slacklinejoe
Slacklinejoe

As someone currently undergoing ketamine therapy, I can say that the drug has been absolutely transformative for my cPTSD, depression, and anxiety. It’s been amazingly helpful in my recovery process when paired with other therapies, techniques, and mental health professionals.

That said, I’ll never understand WTF

Which is politically superior?

“A balloon was shot down after it determined it might enter sensitive airspace.

OR

“A spy balloon was shot down and the computers on board prove indisputably that not only was sent by PRC specifically to spy on sensitive installations, but that it actively conducted electronic espionage.

Okay, so I had the exact same question. (I live in a state where it’s legalized) Being the curious type, I hit up my coworkers to better understand what was going on when it was brought up at a happy hour.

The way my coworkers broke it down was simple: Consider gummies a pill. It’s not a snack, it’s a delivery method

Unless you have a bun in the oven.

Data queries and reporting via T-SQL.

Re: “targeted him for trying to help fellow employees save documents prior to their abrupt removal from the company.”

I don’t know how this is news to people, but “their” documents in their company email are not “their” documents, they are the company’s IP stored on company servers or services.

If you have personal

Security Professional here:

Passwordless Auth and Passkeys are still a good idea, even if the wording in this article has issues.

They have a pure electric model that is non-US in a model that is slightly smaller than a Renegade. US market for things that small isn’t enough to justify it apparently.

This is a case where it’s using battery packs to help with the demand spikes, not a replacement to power generation.

This is already a practice in the actual power grid. In some areas, large centralized battery banks are used to bank electricity to help ease demand during the spikes. This is just a proposal to shift

They exist, they just have to be careful how they advertise. Bose has units that pick up ambient, amplify it based on smartphone controlled settings, and play to their ear buds as an example.

Both the prescription ones that exist today, and the gray-area ones that are already on the market support having a bluetooth

Even if the breaker main is tripped so it’s not going to hurt people outside your home, it also prevents any of your electrical breakers from functioning.

Those exist for a reason. Any issues inside your home move from “Oh, it tripped a breaker,” to “Oh, my spouse was just electrocuted and my house is on fire.”

Many already do.

Security professional here: These aren’t GPS navigation systems, but instead GPS tracker systems (like old school Lo-Jack). They are frequently installed as theft prevention in commercial fleets, rentals, and lease situations where the owner may need to remotely track and optionally disable a vehicle.

With the

Security professional here:

The average hacker is in an environment for around 200 days. Having spent time in China, I can also say that bandwidth in their major cities is often excellent - far better than what you’ll get in most US metros. 

Lastly, if you manage to crack into a PD database, with intent to sell it for

Honestly, this is dangerous advice. It sounds good on the surface, but is terrible in practice.

That’s coming from an IT pro that has deployed LTSC and all of the other versions to global environments. It sucks for home users, normal employee endpoints, and most end up switching to a full OS down the road.

LTSC is

I would propose that it’s less about the products, and more about the marketing angles in this case.

Nowadays, I use a purpose-made electric insulation blanket over the most exposed pipes. Typically, only the most exposed section needs it, as it warms the pipes just enough to keep it above freezing.

Prior to that, we always solved this by leaving a few faucets trickling. Not the best for water conservation, but I grew

Best advertising money that dealership has ever spent.

I think you misunderstand the mechanics here. They compromised a vendor. Inserted malware into the vendors app. Clients updated the app. The data was local, on prem, but the app itself was compromised.

This is a lot like the Solarwinds issues. Those customers were breached because they ran software (on prem) that was