I should also mention that, due to the supply chain attacks on npm and other
package managers, I've started to do development either on a remote headless
machine (using the remote capabilities of JetBrains tools and/or VScode) or on
a disk explicitly setup for software development. That way, if
I didn't say that you *were* trolling, I said it *felt* like you were trolling.
There's a small but non-insignificant difference there.
Also, I'm not one to care for how credentialed someone may be -- so called
professionals are wrong all the time. Nobody is perfect.
So let me expand on what I
(Deep breath. Calm...)
I can't figure out how to respond rationally to the below, so all I'm
going to say is - before you call troll, you might want to research the
author, and read a bit more carefully what they wrote. I don't believe
I recommended any of the crazy things you suggest. And
On 6/28/24 11:23, Arun Khan wrote:
On Wed, Jun 26, 2024 at 12:31 PM Rusty Carruth via PLUG-discuss <
plug-discuss@lists.phxlinux.org> wrote:
Actually, I'd like to start a bit of a discussion on this.
The first step in any cyber security activity is to define your risk
appetite; and define th
On Wed, Jun 26, 2024 at 12:31 PM Rusty Carruth via PLUG-discuss <
plug-discuss@lists.phxlinux.org> wrote:
> Actually, I'd like to start a bit of a discussion on this.
>
The first step in any cyber security activity is to define your risk
appetite; and define the security controls (e.g. sudo) acco
On Tue, Jun 25, 2024 at 11:31 AM AZ Pete via PLUG-discuss <
plug-discuss@lists.phxlinux.org> wrote:
> All,
> I currently have my own domain and am using Proton mail as my mail
> provider using this domain. As such, my DNS MX records point to their mail
> servers, as well as several TXT records for