• 0 Posts
  • 82 Comments
Joined 2 years ago
cake
Cake day: August 2nd, 2023

help-circle
  • On Thursday I attended a company-wide meeting wherein several coworkers tried (with mixed results) to persuade the rest of the company to start using AI. The primary way they did so was by listing incidents in which they’d found it useful.

    One of the examples was (mildly paraphrased) “our other coworker is old, so he knows things like Tom Sawyer. He said he thought I was pulling a Tom Sawyer, trying to convince him to paint the fence.”

    I respect the person who was giving that speech, they seem very knowledgeable, but hearing that they had to ask AI what that meant was just upsetting.

    That said, I guess one use for AI is deciphering idioms?








  • A while ago there was a reddit post about how you don’t need bagged popcorn to pop popcorn. You don’t even need any of them there fancy air poppers. All you need is a glass container and the popcorn itself. And it’s true!

    The only part that presented any trouble was finding a safe container with a safe lid - during the process of popping, an individual kernel is super warm, so if it hits a lid that can’t tolerate that it can melt pits into the lid.

    Other than that (and making sure you don’t add too much popcorn, that stuff expands like crazy), just dump the kernels into your container, cover it up (don’t forget to vent as appropriate) and then microwave as you would the bagged stuff. Add your seasonings, shake up the container, and enjoy.










  • Sorry if I was unclear; what you’re saying is kind of my point. A computer without networking can still have risks, but they’re a lot lower. The standards of security can change with conditions. If you have a computer on an enterprise network, it should be very secure; if on your home network, more cavalier standards can make sense. If you have a computer without any networking whatsoever, being compromised is not impossible, but it’s much less likely unless you’re storing something quite extraordinary on the system. That’s why I referenced networks while talking about the configured security of an individual system. In general, I believe I was broadly agreeing with you.


  • Your home network is certainly less of a security risk due to both being a smaller target and (usually) needing to have fewer services available or ports open, so I would agree with you it’s acceptable for security to be more lax. Personally, I don’t find sudo to be less convenient than su; it’s even saved me from thoughtlessly running a dangerous command a time or two. Also, I try to keep my home network setup close to my work network until doing so gets in the way. If nothing else, this prevents me from getting used to a different way of doing things.

    However, it’s your network. If you find that your way works better for you, by all means, configure your system in whatever way seems best to you!


  • If root has a password, it’s only one password; everyone who has root access knows the password, which means that anyone can share it with no accountability. If privilege escalation rights are granted instead, it’s easy to see who did what, as well as to contain any kind of compromise (by revoking said rights).

    Also, I think you originally referred to su but sudo allows much more granular control.



OSZAR »