rekabis

joined 1 year ago
[–] [email protected] 2 points 1 week ago (1 children)

Right, my bad. I read TCP/IP. It's still early.

🤣🤣🤣 Quite alright. It’s 5AM somewhere on the planet, no?

I believe that makes you older than Arpanet, which is what I was really asking.

If you had asked me if I was older than Arpanet, then no. It first came online a few short years before I was born.

Even though the “IP” in TCP/IP came four years after TCP, the introduction of TCP is frequently cited as the “birth of modern networking”, and as such, the Internet.

[–] [email protected] 4 points 1 week ago (3 children)

But are you older than token ring?

Considering that token ring was first released by IBM almost exactly a decade after TCP (which I was very specific about - TCP specifically, not TCP/IP), then I would most definitely say yes, I am very much older than token ring.

Token ring was introduced as a low-cost networking option for smaller offices that did not require the use of (at the time) fiendishly expensive switching and routing equipment. If you wanted to hook a bunch of machines together into a network and had no need for external access, you quite literally needed only the cabling and the cards that were installed in the computers. No hubs. No switches. Nothing else.

Of course, using token ring also allowed techs to engage in shenanigans such as - when the ring was broken in some way - getting a junior tech to crawl around on the floor looking for the break and the token that fell out of it, to stuff it back into the cable. Sometimes we even did that with particularly difficult customers.

[–] [email protected] 2 points 1 week ago

You know class when you can utilize whilst properly and without ridicule or irony.

[–] [email protected] 12 points 1 week ago (6 children)

I am two years older than TCP.

I am quite literally older than the Internet.

[–] [email protected] 20 points 1 week ago (1 children)

That’s why I put that term in quotes, and was specific about default networking interfaces. I didn’t go into detail because that confuses a lot of people.

Source: working with wireless networks professionally for pretty much the last quarter century.

[–] [email protected] 70 points 1 week ago (11 children)

Sailors on the ship then began finding the STINKY network and asking questions about it.

Oh, c’mon. it is trivial to make an SSID “hidden” for any networking tech that you have administrative control over. That way, only those “in the know” will know the SSID name to type in, in order to access said wireless network. It would not be “discoverable” by standard wireless-connectivity gear such as the default wifi interface in mobile phones.

[–] [email protected] 3 points 2 weeks ago

try to sleep on the plane

That requires a good travel pillow to avoid a massive crick in the neck that can produce immense pain.

[–] [email protected] 2 points 3 weeks ago

And you need a good one because there has been problems with some password managers in the past.

coughLastPasscough

“Problems”. What an delightfully understated term to use.

[–] [email protected] 2 points 3 weeks ago

Especially since it takes more effort to limit it than leave it wide open for whatever length of password a user wants to use.

nvarchar(max) is perfect to store the hashed copy.

[–] [email protected] 9 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

16 characters was the minimum length a password should be due to how easy it was to crack… something like a decade ago.

Now it’s something like 20 to 24 characters.

Seriously, if your company is defining maximum password length and demanding specific content, it is failing at the security game. Have the storage location accept a hashed UTF-8 string of at least 4096 bytes - or nvarchar(max) if it’s a database field - and do a bitwise complexity calculation on the raw password as your only “minimum value” requirement.

Look at how KeePass calculates password complexity, and replicate that for whatever interface you are using. Ensure that it is reasonable, such as 150-200bit complexity, and let users choose whatever they want to achieve that complexity.

[–] [email protected] -1 points 3 weeks ago* (last edited 3 weeks ago)

I have a massive wingspan:weight ratio, so I always have to choose between sleeves being long enough on a shirt that’s 4x too big, or sleeves that end 3 inches short on a shirt that mostly fits.

So you look like you just sauntered out of Auschwitz?

You’re the reason why most shirts don’t fit me. I hate “slim fit” shirts, and anything fashionable is so slim fit you would have trouble fitting it over a skeleton or a 1,000-year-old Sahara-desiccated corpse. Why is your kind so common that the marketplace gets flooded with clothing that can only fit a famine victim?

And I’m not obese in the least. I just have a 50-inch chest with a 36-inch waist. I have pecs, not some wafer-thin slabs of barely-there muscle that would have trouble bench-pressing an onion scape.

About the only thing that fits me are 2XL tops that are regular or relaxed fit. Even jackets have gotten into the “reverse-vanity-sizing” madness that has recently beset Canada, with many “size 50” suit jackets really being a size 46 or even a 44.

.

[–] [email protected] 6 points 3 weeks ago (1 children)

Buried lines of all kinds are frequently severed by excavators because their position isn’t properly or fully documented.

The best set up I ever saw was a sewer tunnel, almost 12 feet tall, that handled all the services. From sewage to water to electricity to data; it held everything and was trivial to maintain and run new lines in.

view more: next ›