Guess I should give him 4 more years to decide you’re right then.
Guess I should give him 4 more years to decide you’re right then.
Not a tiny speck. You’re not far off however. Theoretically, before expansion, all matter and energy is contracted into an infinitely dense space. Infinite density of infinite mass and infinite energy occupied infinite space. Or at least that is the start of the big bang.
The original commercial was showing different women as if to imply it works for anyone. The arrangement of the panels is different from the original ad. It looks like panels 2 and 4 are swapped. I believe there are 2 different women.
Considering it hasn’t happened in the US yet…
Ms auth is a mobile only application. Not even available on windows or macOS. The point of it is to provide a second factor of authentication in the for of “something you have”. There are a few factors that can be used for authentication. Something you know (password), something you have (hardware like a key or a phone), and something you are (iris scan, DNA, fingerprint, other biometric). Ms auth uses something you have and something you are to authenticate most users. You provide a password and then you prove you have your cellphone and your cellphone checks your biometrics to see if you are you. In that way, it is effectively checking all 3 factors.
It doesn’t change anything for the company with exception to billable IT time used when the authenticator confuses users which is already high with only one authenticator.
It doesn’t report location, Entra login reports location regardless of authentication method used.
I work for an MSP servicing 5k users all of whom I force to use M$ Auth app. Because it is the best Authenticator on the market, their company is paying for it, and because I look at the sign in logs for 3-4 different organizations every day to see literal hundreds of foreign sign-in attempts that fail due to M$ MFA. Yeah fuck monopolistic megacorps but understand when they provide an actual good product that is safe to use and actively protects you as an individual better than anything else out there.
All that said, the most likely reason is that they don’t want to make a document explaining how to set up MFA for each of the dozen+ apps out there and they certainly don’t want to talk to users who don’t know what they are doing with which ever app their kid set up for them
I’m sure you know what you’re doing better than 80% of the other employees in your office in this regard but I can tell you from experience, when one person gets their way, everyone wants theirs too.
Gondii is my favorite if theirs
This is a metaphor for life in general. If you find that all your interactions are negative, check yourself. Are you the problem in your relationships and interactions? How can you fix that? Clean your shoes.
If everywhere you go smells like shit, check your shoes.
“28496 - there, it’s fucking fixed you twat waffle.”
Ticketed bug bosses son found. Dude nagged his dad who nagged us until it got fixed. Boss doesn’t review code. And for the sake of a half dozen coworkers, I hope he never does.
Today is actually Hitler’s birthday. That is all
Wait a minute, what IF
What’s wrong with Manjaro?
They’ve literally had 2 of them. The Vive, built by HTC and sold by Valve on Steam and its predecessor The Valve Index. Anyone who would consider themselves even mildly interested in VR Gaming probably knows about at least one of them.
If you brute force using single iterations of all possible combinations sure. But people don’t do that. They use fully readable passwords and letter substitutions. This makes dictionary attacks viable. There are a known number of readable words and phonetic combinations that are significantly easier to brute force. And also the vast majority of numbers are also guessable because most numbers are dates. Series of 2 or 4 or 8 numbers to form important dates means there are lots of numbers between 1940-2024. People don’t usually unconditionally random alphanumeric passwords. Therefore peoples passwords will never be fully secure against sufficiently advanced brute force methods.
But don’t use lastpass, they are the most popular, and with the largest breach history. In fact, if you are capable of the admittedly high bar of self hosting, use bit warden instead.
Have you ever power cycled a server? It can take over 10 minutes depending on the machine.