• 0 Posts
  • 40 Comments
Joined 11 months ago
cake
Cake day: July 18th, 2023

help-circle




  • My wife hates been called “luv” mainly old dudes that think they are been nice, so she calls them luv back. Maybe someone needs to be greated every morning with with a nice big smile and a good morning flower.

    Also if the getting left on your own for a smoke break when busy happens, just go for a smoke break with her, or be on your phone and say something like “I don’t know where Sarah went she just disappeared, oh wait I’ve found her outside having a smoke break, do you want me to tell her to come back inside”

    As it’s a uni job it’s now your mission to wind her up as much as possible, don’t worry about bad references or CV gaps if anything goes wrong.

    Also look up constructive dismissal






  • I think you are not understanding how global shipping works, the ship could be owned by company in country A, hired by company in country B, under the flag of country C, cargo owned by country D, crew from country E, F and G or any random mix of everything.

    Also the vast majority of goods to Europe goes through the red sea, and Suez canal. Remember what happened last time shipping stopped going through the Suez canal. It directly effects the economies of Europe, which most countries are NATO, so you could say it’s an attack on NATO country, which is article 5 of the treaty, and the only time article 5 has been invoked, was the 9/11 attacks, which led to a 20year(?) war. So maybe there is some interest in not letting it get that far again




  • It all depends on how paranoid you feel. If the device has a hardcoded IP addresses changing the DNS won’t do anything. The only way to block that is by using a firewall external to your device and blocking it that way. You can get malware/backdoors in all the places you mention, and even built in to usb cables as well.

    In the end the question becomes who can you actually trust, and how sensitive is your data. At some point you have to trust someone and potentially give any some form of data/information, otherwise you are just living in a bubble with no access to anything.

    Personally I don’t believe anyone is interested in my data/info for anything other than selling adverts towards me, and potentially trying to steal money via scams, fraud etc.

    I run a pixel 6a, some people will tell me that Google has all my data, and they are right, however I know what they have and can be pretty certain that I’m not going to have random crap and potential malware on the CPU or chip on the board, and it also receives regular updates.

    Any app you run the phone (unless root enabled) will have to run on top of whatever rom you have installed, and is ultimately controlled by the Rom. It probably isn’t but again depends on level paranoia and trust you have. The paranoid route would be to build your own version of android from source on something like a fairphone.







  • If you have to use a program that is windows only you have to use windows. I could move our entire company over to Linux if it wasn’t for SOLIDWORKS been windows only.

    Wine can be an option but I’ve found it very hit and miss on some of the more obscure windows only programs

    In the past I’ve used virtual box (virtual machine) in seamless mode, so it looks just like a window in Linux. I can’t remember why I stopped, I think it was down to licencing and oracle buying it.