Comment Re:No The VPNs Did Not Leak IPs (Score 1) 83
It looks to me like the STUN server is the one doing the leaking. And that's a function of whatever WebRTC service you're using, not your VPN provider or your browser.
It looks to me like the STUN server is the one doing the leaking. And that's a function of whatever WebRTC service you're using, not your VPN provider or your browser.
The game does have moderation for location submission. It can take weeks to get a "yes" or "no" response once you've submitted a photo, description, and GPS location.
And how is this any different from the PICMG 1.x standards?
http://www.picmg.org/v2internal/resourcepage2.cfm?id=8
Lots of people have been building systems around this technology for years using passive backplanes.
Your biggest problem isn't humidity, it's going to be salt. Those cargo containers are not airtight, and if nothing else your crates and pallets may be sitting on a dock for an extended period of time. If things are in well-sealed cardboard boxes, it shouldn't be an issue... but you're not very clear on how your stuff is being packed.
Consider getting one of the large rolls of cling-film used for shipping (i.e. similar to saran-wrap). For electronics (TV, computer, printer, maybe even the coffee machine) wrap them individually with the cling-film; it's not perfect, but if done well (i.e. tightly and completely) that should choke-off any salt spray from finding it's way inside.
Also, anything that is on a pallet (but not a crate) should be wrapped and strapped so that the (a) the pallet stays in one piece, and (b) it is tamper-evident.
I use DenyHosts to identify attackers and protect my system. Then, for any new blocked IP, I check to see if it's local to my service provider. Generally, I think the service providers will be much more reponsive to one of their customers attacking another, even if it's a compromised machine.
Cheap CCD + Rad source from smoke detector == true RNG. If nothing else, some of the advanced physics or math classes in the district might be interested in the project.
Sounds like this list needs to be broken down into multiple sub-functions.
Web filtering, site access control, and total Internet denial are functions for a web proxy or other content filter. You should be able to find a linux-based web proxy that will do what you want in that department.
Scheduling usage hours, forcing logout, etc. is the sort of thing you can do with "policy" objects if you had a Windows Domain Controller. That's probably outside of your budget. But, generally, you need to be looking for client/workstation policy tools.
The computer health monitoring stuff might be part of the policy tools, but might not.
We seem to get a lot of these sorts of questions at
The Value Proposition
At the end of the day, what I'm doing is entering into an agreement where I give you money (and things that cost money, ie. benefits), and you give me your labor. Your skills and experience and a few other factors (ie. culture fit) alter your "productivity", or how much "labor" I get for my money. In other words, I am spending my money on you, and I want to make sure I get good "value" for that money.
As such, I really don't particularly care who you worked for in the past, unless it can be used as some predictor of future performance. I do care about the skills and experience you have picked up along the way, your personality, your thought-process, etc.
Occasionally, very occasionally, the "where you used to work" question does become relevant. If your last job was for a blood-relative, that is going to be a yellow-flag that needs further investigation and verification. That's probably the most common scenario where it comes into play.
Gee, thanks for giving that one away to everyone.
As for not knowing much C, if that is a requirement of the position you had better d*mned well tell me you're not that comfortable with the language early in the process.
Two things will get you immediately disqualified during an interview:
1) Lying to me (and getting caught, obviously)
2) Wasting my time, which usually happens due to #1
This is a fair comment. This screening technique would tend to be biased against individuals such as yourself.
At the same time, I would expect that for a job which requires C/C++ and assembly experience, you would review the relevant material before showing up at the interview.
I did have one person ask if I cared if they solved it in another language, because it was easier to solve there. I accepted that answer, so long as the person could tell me *why* it was easier.
As for the puzzles.... I could ask you about your code for solving "well known" problems, but that would show me your ability to recall past problems solved. While that's valuable, what I'm interested in is how you approach problems you've never seen before.
I can understand this feeling, but look at it from the other side: As an interviewer, I *need* to know if you're telling me the truth or not. Just the act of hiring you to fire you a week later consumes significant resources; I can't really afford to make a mistake.
Also, I've had people fail the test. And it was a really really simple test. I once asked someone to "write a C function that takes an integer as a parameter and returns the square of that integer". After 15 minutes of fumbling at the whiteboard, they had something that looked like a cross between Matlab and Pascal and completely failed to be anything close to correct, even if you ignored the syntax problems. That candidate claimed to have 20+ years of experience.
Generally, my interviews consist of 3 parts.
Of course, if they can't pass the first two sections of the test, I don't bother with the third.
The question, then, is not one of "needing to trust Google". The question is, "Is Google more or less trustworthy than the current solution?" There is a fair argument that a large, multi-billion dollar company has a lot more to lose should things go sideways than a contractor. There is also a fair argument that they probably have 1000x more people with access to the data than an independent contractor.
This, of course, ignores any legal requirements like HIPAA, PCI DSS, etc. etc. But I think my point is still valid: If the client has already contracted out management and/or hosting of their data, they have already made the decision to trust an outsider. Going with Google or not is just a question of "which outsider do we trust"
If all else fails, immortality can always be assured by spectacular error. -- John Kenneth Galbraith