Avatar

kevincox

kevincox@lemmy.ml
Joined
23 posts • 710 comments
Direct message

Yeah sorry. I should have said “ready-to-eat food that you actually want to eat”. As in hot food regularly being cooked and refrigerated food that is brought in fresh multiple times a day.

permalink
report
parent
reply

This is a great point, but it probably doesn’t do the job as well as more modern alternatives.

  1. Easy to lose, possible data leak concerns.
  2. Easy to retain data that should have been deleted.
  3. Easy to lose data if a disk gets lost or damaged.
  4. Likely wastes time when trying to track down the disk you need to getting someone to transfer it.
  5. Lack of access logs and auditing capabilities.
  6. Easy way for viruses to spread.

Modern IT managed file servers solve a lot of real problems when well-managed.

permalink
report
parent
reply

Convenience stores in Japan are much more than the cigarettes and lottery tickets of North America. They have lots of ready-to-eat food, snacks, drinks as well as some banking services, bill payments, faxing and more.

permalink
report
parent
reply

There are a few reasons. Some of them are in the users’ interest. Lots of people phrase their search like a question. “How do I turn off the wifi on my blue windows 11 laptop?”

While ignoring stopwords like “the” and “a” has been common for a while there is lots of info here that the user probably doesn’t actually care about. “my” is probably not helping the search, “how” may not either. Also in this case “blue” is almost certainly irrelevant. So by allowing near matches search engines can get the most helpful articles even if they don’t contain all of the words.

Secondly search engines often allow stemming and synonym matching. This isn’t really ignoring words but can give the appearance of doing so. For example maybe “windows” gets stemmed to “window” and “laptop” is allowed to match with “notebook”. You may get an article that is talking about a window of opportunity and writing in notebooks and it seems like these words have been ignored. This is generally helpful as often the best result won’t have used the exact same words that you did in the query.

Of course then there are the more negative reasons.

  1. Someone decided that you can’t buy anything if your product search returns no results. So they decided that they will show the “closest matches” even if nothing is anywhere close. This is infuriating and I have stopped using many sites because of it.
  2. If you need to make more searches or view more pages you also see more ads.
permalink
report
reply

There are some password managers where you need to either manually look up passwords and copy+paste or autotype them or select the correct password from a dropdown. Some of these will come with an optional browser extension which mitigates this but some don’t really tract domain metadata in a concrete way to do this linking.

Some examples would be Pass which doesn’t have any standard metadata for domain/URL info (although some informal schemes are used by various tools including browser-integration extensions) and KeePass which has the metadata but doesn’t come with a browser extension by default.

permalink
report
parent
reply

The reason I say browser password manager is two main reasons:

  1. It is absolutely critical that it checks the domain to prevent phishing.
  2. People already have a browser and are often logged into some sort of sync. It is a small step to use it.

So yes, if you want to use a different password manager go right ahead, as long as it checks the domain before filling the password.

permalink
report
parent
reply

I don’t think that is quite accurate.

We discovered many more Pluto-or-larger sized things that were closer to the sun than Pluto. It became increasingly obvious that there was nothing special about Pluto and we either needed to add hundreds of planets or “demote” Pluto.

permalink
report
parent
reply

You probably mean TOTP. OTP is a generic term for any one-time-password which includes SMS-based 2FA. The other main standard is HOTP which will use a counter or challenge instead of the time as the input but this is rarely used.

permalink
report
parent
reply

Tips for being secure online:

  1. Use your browser’s password manager to generate random passwords.
  2. In the rare case you need to manually enter your password into a site or app be very suspicious and very careful.
  3. Never give personal information to someone who calls or emails you. If necessary look up the contact info of who called you yourself and call them back before divulging and details. Keep in mind that Caller ID and the From address of emails can be faked.
  4. Update software regularly. Security problems are regularly fixed.

That’s really all you need. You don’t even need 2FA, it is nice extra security but if you use random passwords and don’t enter your passwords into phishing sites it is largely unnecessary.

permalink
report
parent
reply

I’m not an expert on modern alarm systems but it seems that it is very common and fairly inexpensive to have cellular data backup. Not every system has it, but many do. In that case cutting the main connection will likely result in someone appearing on site fairly quickly.

Many cameras also have some form of local buffering. So even if you are gone before someone does show up you still may find yourself recorded.

But at the end of the day just put a bag over your head and you can be gone by the time anyone shows up without leaving a meaningful trace. Other than the very top-end system security systems just keep the honest people honest.

permalink
report
parent
reply