• 6 Posts
  • 12 Comments
Joined 2 years ago
cake
Cake day: June 26th, 2023

help-circle

  • My company uses a VPN where the client is so slow inside the VM it is functionally useless. 99%of the time I can still get away with it because my connection amounts to a couple of telnet sessions, but when I actually need data or a spreadsheet or something transferred local, I need to fire up windows directly to snag it.

    Sonicwall has a VPN client that will run fine on Linux (or so they say), but the company won’t switch over to it. And sonicwall considers the windows only version eol and won’t add a Linux version


  • I got tired of windows updates breaking my dual boot. After some research I found that it’s possible to have two uefi partitions: one for windows and one for Linux. It’s not standard but there is nothing expressly written into the efi spec that prohibits it. And it just works. My bios doesn’t care, and works with them both just fine.

    I only use Windows for that 1% of business stuff I can’t accomplish in a vm under windows. Invariably after I boot into widows once ever 3 months it installs so.e update and would kill my ability to boot into Linux. Since setting up 2 partitions I haven’t had this problem.


  • The best advice I got was to periodically delete your current account and create a new one. Then remove any association you have with the old account: history, password managers, etc. Yes, that accounts comments may live on for ever in some archive, but removing your association with it goes a long way towards plausible deniability. If your super paranoid only access Lemmy through tor going forward.









  • Maybe it depends on the access point. When I turn it off on my router there are no beacons sent. Unless you specifically probe the ssid it doesn’t announce itself. BUT granted when you make a connection the ssid does show up during the handshake. If you were watching at the exact moment of connection then it would be detectable. I suppose they could use a mass deauther device and cause new connections and detect while that is happening but they they would need to triangulate the location of said ap… Again a lot of extra equipment.