• 0 Posts
  • 37 Comments
Joined 14 days ago
cake
Cake day: June 5th, 2025

help-circle

  • Yeah, if the student devices are locked down its done so per policy. Creating VMs which allow students to bypass that policy is going to potentially get you into trouble with administration. IT could maybe setup those students with Citrix Workspaces or something similar they support to achieve that without having to throw student restrictions out the window.


  • So, this was more common when WEP encryption was used. You could just listen to the radio traffic of the given network and collect IVs which the encryption would leak. Once you had enough pieces you could reassemble the key and access the network. When WPA came out it was harder, but tools like pyrit and john the ripper helped, so long as you were able to capture the 4-way TCP handshake.

    To actually see the networks, you would build biquad parabolic antennas from old DirecTV dishes people left behind. They were very directional high gain antennas that you would just target at someone’s house. We’d also build cantennas from junk laying around. Those were interesting days.





  • That article is probably not the best way to support that idea though. It mentions “when 3.5% of its population actively mobilized against it” but doesn’t explain what “actively mobilized” even means. It talks about how effective non-violence has been in other countries but then caveats that to being when an independent judiciary was present. It even uses Kilmar Abrego Garcia to support that idea, but fails to mention that a lower court’s decision was ignored and the only reason the SC was involved was because the administration said it didn’t have to listen to them.

    Obstruction is good, but ultimately if you are not at risk of losing anything by that obstruction, it likely isn’t an effective way to accomplish anything. That’s even if you could consider it obstruction. If you are permitted to have a rally then you are not obstructing anything. You’re just having a good time. Municipalities don’t approve permits that obstruct, its the whole reason for permits.


  • Tailscale has the funnel command which exposes services like how you describe, but that’s off the table.

    Not quite sure I understand your layout, but if these are separate VPNs, you could run one from the server with a port forward (guessing that’s not through Mullvad as they don’t offer forwards any longer - to my knowledge) and then setup the general VPN on your router perhaps so you don’t have to change ip routes for the whole network. You would still probably need to setup an ip route specific to the server VPN traffic on the router at that point, but that would probably be less work.

    If this all being done from the same device then you would need to separate them out by IP routes.


  • I don’t think its a matter of violence vs non-violence. Even in the samples provided by the article, its a matter of willingness to commit what would otherwise be criminal acts. Ghandi was successful not because of the Salt March but because they created the Declaration of Sovereignty and Self-rule and refused to pay taxes until negotiations were made.

    I remember Penn and Teller did an episode that touched on this on a show they had. The big take away was there is a difference between doing good and doing something that makes you feel good. What’s accomplished by a sit-in on a courthouse lawn on the weekend that you filed and received a permit to do from the city? People like to compare stuff like that to the 1960s civil rights movement, but here’s the thing: Rosa Parks not giving up her seat wasn’t a social faux pas, it was a criminal act in Alabama.





  • Mundane tasks weren’t really the focus. This was a debate between Redhat and the Linux old guard where the points were all based on the extremes. They follow different ideas on how tools should work, though. Init systems focus on doing one or few things but doing them very well (the traditional UNIX approach). Systemd is a suite of many moving parts to accomplish a whole range of tasks (more modern). Init is mostly just bootstrap and services, but systemd is that plus networking, plus user sessions, plus logging, etc etc. More moving parts means increased complexity and more chance for failure. Systemd as a suite then becomes a potential single point failure where init based systems would not be. Scripting for either can be involved, but generally speaking init is/was easier to write things for.

    I think most users today focus on Redhat’s control and not putting too much faith in one setup for diversity’s sake rather than the other points, but the original debate really was a philosophically based one. There isn’t a right or wrong on these, but some really interesting history.



  • Ok, this is your summarized argument: Accel is going to gut the company and run it into the ground because that’s what they do, but they haven’t ever done that, but they could, so they will, so that’s the same as doing it, although they haven’t, but it will happen in the end because that’s what they do, but they don’t.

    Its not a strawman if what you say is in fact a weakly constructed idea. Its just a weakly constructed idea then. Its nothing but vague generalizations and “what ifs” you posted. Let me just put it this way: evidence or stfu.