• 0 Posts
  • 103 Comments
Joined 2 years ago
cake
Cake day: June 7th, 2023

help-circle

  • There’s plenty of fraud, waste and abuse. It’s just conveniently called “contracting”, so money can be shoved out the door to private companies which do half the work at twice the price and end up delivering shoddy results. The reason DOGE didn’t find anything was that they weren’t looking at the contracting companies and instead were looking at the agencies themselves and the employees working for them. I won’t say that some of those agencies aren’t a complete waste of money (see: TSA, ICE, DOGE); but, DOGE was hyper-focused on agencies which actually do useful stuff (e.g.: SSA, NOAA).




  • do any of you hate how self-hosting services like photo- or document-management systems, or even a simple rss tool, forces you to sort your stuff out, and put your decades old files in order?!

    What is this “sort” thing you speak of? I don’t sort anything, I have NextCloud syncing my entire photos, videos and documents folders and they are just as messy as ever. Granted, I do go through my photos and videos once a year and dump them in a folder named for the year they were taken. Occasionally, I’ll go hog wild and try to sort some of a year’s photos/videos into folders named after events. Though, that hasn’t happened in a number of years. I setup NextCloud so I could have everything synced to my own server and just forget, not have to deal with labeling my data.

    As for bookmarks. I already keep those in folders; but, I don’t sync those. I use my desktop far more than I use my phone for web browsing. And the types of things I use my phone for (mostly recipes), I just keep bookmarked there.


  • The first issue with running a coin miner is using company resources for your own profit. Your own system, using your own electricity, go for it. Running it on a company owned laptop, while at a company building, burning electricity the company is paying for. Ya, that starts to get uncomfortably close to fraud or theft. There is also that whole, “running unauthorized software on a company system, doing who knows what else in the background.” There is a very real possibility that the coin miner has unknown vulnerabilities which could allow remote code execution; or, just outright be malicious and contain a remote access trojan. Maybe he was smart enough to audit all the code it was using and be very sure that’s not the case. More likely, he just grabbed a random implementation of XMRIG, put his wallet in the config file and ran it. Either way, he also made a point of refusing to remove it, so we escalated up to management. With the recent ransomware outbreak having been in the multi-million dollar (possibly low tens of millions) damage range, refusing to remove unauthorized software went over about as well as a lead balloon. There may have been other factors at play; but, the unauthorized software and being a dick about removing it was what got him out the door.


  • If you spin it up, fucking own it. When you’re done with it, shut it down. I have long lost count of the number of times I’ve reached out to a team to ask about the coin miner they are running on some random EC2 instance only to find out that some jackass spun it up for a test, gave it a public IP, set the VPC to allow any inbound traffic, installed all kinds of random crap and then never updated it. Nor did it get shutdown when the test ended. So, a year and a half later, when the software was woefully out of date, someone hacked it and spun up a coin miner. Oh, and the jackass who set it up didn’t bother to enable logging or security monitoring. But, they sure as hell needed the ability to spin stuff up on their own. Because working with IT to get it done right would be too hard for their fragile little ego.


  • You joke, but I’ve actually been responsible for a coder getting shown the door for running a coin miner on his work laptop.

    In his defense, cyber security at that company was crap for a long time. After a ransomware outbreak, they started paying attention and brought some folks like myself in to start digging out. This guy missed the easy out of, “hey that’s not mine!” The logs we had were spotty enough that we would have just nuked the laptop and moved on. But no, he had to fight us and insist that he should be allowed to run a coin miner on his work laptop. Management was not amused.



  • Ya, sadly there is still a lot of useful content in the technical subreddits. So I find myself ending up there via search engines on a fairly regular basis. But, I specifically use the Redirector plugin for Firefox to auto-magically force the use of old Reddit. If I hit the site on my work computer, I’m quickly reminded about why I quit the site.


  • An Operating System is a tool. Would you be annoyed because you had to use a hex key on a bolt with a hex socket, when what you really like using is a robertson drive? If the work you are doing is dependent on a particular OS choice, then use that OS and get over yourself.

    That said, if this is for work and you want to avoid the crapware in Windows 11, talk with your IT team. By default, Recall is removed on commercially managed devices. I’m not 100% sure, and can’t be arsed to look it up at the moment, but this likely refers to devices managed via Intune. Assuming your IT team isn’t stuck in the 90’s, they are probably doing this already. Telemetry can also be mostly disabled via Group Policy, and many IT organizations will already be doing this. Or, as you have arrived at, use a Mac and disable the telemetry.

    On the other side of that coin, if you expect privacy on a work owned device, I have bad news for you. More and more organizations are using Endpoint Detection and Response (EDR) products on all endpoint devices. Yes, this includes Mac and Linux devices. So, your organization is watching you browse porn on your work device. If you are doing something and you don’t want someone watching over your shoulder, don’t use a work device. Keep your work device for work and your personal device for everything else.





  • My personal preference is to use FOSS whenever it’s practical. For home use, I’ve switched to FOSS for the vast majority of my computing needs. I run Linux on both my server and desktop. Most of the software on my server is FOSS, with the one exception being a container using the Splunk free license. My desktop is running Linux, and I use LibreOffice for documents and the like. I do run Visual Studio Code, which is technically Open Source, though I would not put it past Microsoft to do a rug-pull on that eventually. And I have an extensive library of games with Steam, basically nothing of which is Open Source.

    I have reached a point, financially, that piracy is not morally defensible. And I’m not willing to get into the mire of if, or where such a line would be. I believe that creators should be rewarded for their work. Though, I also agree that the limits on copyright are way out of whack with the changes Disney has purchased through the years. So, piracy as a moral question is a murky subject, with no clear answers to me. But, the end result is that I buy games, movies or TV shows. For other software, I usually look to FOSS projects (e.g. Gimp vs Photoshop, FreeCAD/OpenSCAD vs Autodesk), free licenses (e.g. Splunk) or just do without. For TV Shows/Movies, if it’s not on one of the streaming services I subscribe to, I may buy it via a digital service; or, I do without.



  • No, if you open a terminal and run:
    sudo dmesg

    You should get a long output which is the kernel log. Assuming the crash happened recently, there may be something in the last few lines (bottom of the output) which could indicate why the process died (or was killed). Keep in mind that this is a running log; so, if it’s been a while since the crash, the entries for it may be higher up in the log. It’s often best (if you can) to trigger the problem then immediately go run the sudo dmesg command and look at the output. With luck, there will be useful logs. If not, you may need to look elsewhere.