@Chefdano3@lemm.ee avatar

Chefdano3

@[email protected]

This profile is from a federated server and may be incomplete. View on remote instance

Chefdano3 ,
@Chefdano3@lemm.ee avatar

Sound like the solution is the arm the protesters.

Chefdano3 ,
@Chefdano3@lemm.ee avatar

Wow this is an actually interesting question. At first it kinda of seems ridiculous that a provider of age restricted content put the onus of said age verification onto a completed unrelated company. To say the manufacturers of devices capable of going online are the ones responsible for verifying the age of the user seems backwards, and a little unfair to the makers of the devices.

But on the other hand, they make a good point that if one company is collecting info on users to verify if they are legally old enough to view the content, and if they are required to get legal documentation to prove it, That could be a security concern. If the site collects that information from it’s users and their network gets compromised, the hacker obtains the legal documents of all of its users. However if you have your device get a certification of your age and be able to pass that cert to a site, and a hacker compromised your device, they would only get the information of that one user. In this way it would act like getting a drink wristband at a concert or large event. Instead of having to show your ID to a bunch of different people, you show it to one, and everyone else just sees that you’ve been verified of legal age without needing to see the actual ID.

On the other other hand, since personal devices are fully in the hands of the users, it would be pretty safe to assume that users will be able to trick the device into believing they are of legal age with relative ease, so it’s effectiveness might not be that great.

Idk man, this is kinda interesting.

What do you use to track BMCs/KVMs/IPMI?

I manage hundreds of servers at work. They each have a BMC (remote power on/off, reset, KVM, etc) and we need to use those features frequently. I’ve been using a Google Docs spreadsheet to track their URLs, what each box is used for, specs, etc but it feels like a dynamic web app would be better for this purpose. Does anyone...

Chefdano3 ,
@Chefdano3@lemm.ee avatar

At my company, we just have a standardized remote management suffix that we just throw at the end of the hostname, so we don’t actually track the urls. For example the server is named frosty, the url would be frostysuffix.

Then we track our servers with either an outdated access database that nobody updates, my locally saved personal Excel sheet, or by logging into one of the 4 different health checking applications that each monitor a piece of the infrastructure. (This part actually really sucks and I hate it.)

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • All magazines