![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/13c64711-f6bb-429b-a54a-4e65e4e37046.png)
Article seems to be behind a paywall.
Article seems to be behind a paywall.
I can’t say I agree with your opinion, but that’s what this community is all about and it’s pretty brave of you going out there 🙃.
Looks like you won today’s unpopular opinion! You can collect your downvotes at the door 😅.
You must not have read the post properly then. It comes from linux’s sbin.
Scientists are evil and just enjoy giving mice Alzheimer’s.
For those who didn’t read the article, so far it’s only being tested in mice with promising results.
The downvotes are a hilarious way to show you’ve found yourself an unpopular opinion. Congrats I guess.
It might be the filters in the pump are clogged.
I use it as a way to discover new communities. Any recommendations on how you manage your subscription without looking at all from time to time?
I’m sorry. He’s too far gone.
Better use a cipher then for your pen and paper transmission. Invisible ink as well.
Password rotation isn’t necessary anymore according to NIST. Use long/strong unique passwords combined with MFA.
Furthermore, public wifi risk is overblown. As long as you ensure encrypted communication, you’re good.
This has no direct effect on privacy by the way.
Source: I’m an information Security manager.
Never played JOTL. to be fair, I think frosthaven went overboard on mission complexity and overhead.
I’m buying GH2, so that should scratch the itch in 2024 when we’re done with FH. I only played about 10 scenarios of GH1.
It’s pretty rough in terms of rules and setup takes a while, but it’s so worth it.
I play frosthaven on a weekly basis and sacrifice most of my boardgame time to playing it.
Frosthaven/Gloomhaven. They’re co-op, but all of the hidden information stuff stop other players from influencing your turns too much.
Absolutely wonderful games!
The 1990s just called. They want their article back.
No one is still running a lot of bare metal. Everything is virtualized at the bare minimum, or containerized or Serverless code.
Furthermore the article doesn’t really teach you anything new except for the existence of the hypervisor layer. Threats and controls are mostly the same between physical and virtualized.
:Edit: just saw you wrote this article. Sorry for the harsh criticism, but I stand by it. Try to be more accurate with your threat and control assessments or write about more niche technology.
They’re probably using MS exchange /s
My wife and I are saving up to do something similar in about 5 years. Any recommendations/things you’ve learnt you’d like to share?
Blame shitty cell phone cameras 😉. Definitely not the photographer’s fault.
I use alt 0160 for a non-line breaking space.