Cuffed would be more like detained. Not free to leave, because they’re actively investigating, but no charges are being presented. Literally just placed in cuffs while the police do their snooping.
Cuffed would be more like detained. Not free to leave, because they’re actively investigating, but no charges are being presented. Literally just placed in cuffs while the police do their snooping.
The rabbit lies too.
Depending on what you’re needing done, a lot of times IT has to cover their asses. If it didn’t happen on that phone call, it didn’t happen. I always appreciate the gumption, you probably saved us like, 30 call just from figuring out other issues yourself. If it’s anything that will cost the company money, though, like replacing hardware - if I don’t take due diligence in making sure those earlier steps are done, it’s my ass on the line.
You know you’re smart enough to do the troubleshooting, but that technician has probably 1000+ users that rotate weekly, they can’t keep a log book of which ones are good and which ones will land them in the shit. I totally get the frustration, but the ones who lie about doing simple troubleshooting ruin it for everyone.
It’s the same as going to a mechanic and saying “my car doesn’t work!” No shit? That’s usually why people come here. Wanna be more specific?
I support doing the troubleshooting yourself. Just be aware, if you call with one of those 9 out of 10 cases, we’re still going to have to do ALL of those steps again, so I can document that we tried them before sending any hardware. I’ve been burned one too many times by someone telling me they’ve already tried something.
To be fair, I do IT for convenience stores. Sometimes we have to reboot pumps or similar, and all we can do is have them throw a breaker for 30 seconds lmao
Funny, for me repeat offenders somehow always had a second request I couldn’t find until 430pm on a Friday. Strange how it always happened. Oh well, sucks to suck.
You never know what security holes exist until they’re exploited. Nothing you can really do about that. Security and convenience have always, and will always, be a trade off and a matter of personal acceptability. If you host anything, it will be potentially vulnerable, way less so if you take proper precautions. If you’re not just overtly insecure, you’ll probably be fine, but there’s no way to say for sure.
Tech tried to tell them it was unnecessary, would take forever, and would be expensive. I’d agree with you if, for a second, the customer sounded like they wanted to drop the matter. No, this was the customer absolutely digging their heels in, and the tech did what they could to get an irate woman out of the store.
At a certain point, you have to just let people make their mistakes, and get out of their way. This is exactly how I interpret the situation.
In a customer service setting, often times that’s all you can do. The customer knows what they want, and particularly if there’s money to be made, your employer will require you to do so. It sounds like this place wasn’t exactly like that, but dude said multiple times this was unnecessary, and the customer still wanted it. He told them it’d be long and expensive. And unnecessary. They said do it. At a certain point, we have to trust that the customer really is their best advocate, and just do what they want.
Is it really a scam if you tell them up front the work is unnecessary, you don’t want to do it, and they insist? At a certain point, it’s the customer hoisting themselves by their own petards.
Game theory would lead you, as the tortured, to realize that they’re just going to beat you until death to extract any keys you may or may not have, so the proper answer is to give them 1 and no more. You’re dead anyway, may as well actually protect what you thought was worth protecting. Giving 1 key that opens a dummy vault may get the torturers to stop at you, thinking this lead is a dead one.
If you set it up correctly, this is essentially what it does. You have a disc that is, say, 1tb. It’s encrypted, so without a key, it’s just a bunch of random noise. 2 keys decrypt different vaults, but they each have access to the full space. The files with the proper key get revealed, but the rest just looks like noise still, no way to tell if it’s empty space or if it’s a bunch of files.
This does have an interesting effect. Since both drives share the same space, you can overfill one, and it’ll start overwriting data from the second. Say you have a 1tb drive, and 2 vaults with 400gb spent. If you then go try to write like, 300gb of data to one vault, it’ll allow you to do so, by overwriting 200gb of what the drive thinks is empty space, but is actually encrypted by another key.
It’s been a while since I’ve messed with this tech, and I’m mostly a layman, but this should be a fairly accurate depiction of what’s actually happening.
Mp3s, standard def movies, HD movies, and 4k movies.
At the end of the day, both are required. You need to study to be effective at what you’re doing, but at the end of the day the only way words get on paper is writing. You’ll also get more out of learning these structures and ideals trying to apply them after you have a bit of time just floundering, getting a feel for the actual task.
I choose to eschew my mouse when I can because it’s easier. I don’t have to move my arms around as much, and I can work quicker. It’s more comfortable. All of this is a preference thing, why should anyone do something my way if it’s not how they prefer?
So just for clarification, when was your son born?
Why not your personal identification PIN number? Gotta be specific. Your personal PIN number is just the one you like, but it identifies nothing. Same with the identification PIN number. It identifies something but not sure what. And a personal identification PIN, well, it identifies someone, and uses a number somewhere.
I think it’s just capitalizing on a trend to add n’t to otherwise noy contractions, to make them into contractions. Contractionn’ts, if you will
Reminds me of this video, the the impotence of proofreading