• 9 Posts
  • 422 Comments
Joined 1 year ago
cake
Cake day: June 24th, 2023

help-circle










  • fmstrat@lemmy.nowsci.comtoScience Memes@mander.xyzHow often?
    link
    fedilink
    English
    arrow-up
    12
    ·
    edit-2
    20 days ago

    The periodic table, also known as the periodic table of the elements, is an ordered arrangement of the chemical elements into rows (“periods”) and columns (“groups”). It is an icon of chemistry and is widely used in physics and other sciences. It is a depiction of the periodic law, which states that when the elements are arranged in order of their atomic numbers an approximate recurrence of their properties is evident.

    https://en.m.wikipedia.org/wiki/Periodic_table

    That being said, the whole point of a quick-lookup reference chart is to be a… well…

    Edit: this was supposed to be on the main post, not the furniture joke, but… well…





  • You, as a network engineer, at a business, where SSH is normal. This is not your realm, as schools look for very different signals. They are rarely actively monitored, but when they are, SSH will 100% look suspicious, and this individual already has a flag on them for tor, so yes they go beyond MAC and can identify them. You haven’t even asked what kind of school it is, how they access school content when on the network that could identify their machine, or what the risks are for getting caught, yet you want to push a method when others have provided better8 options for obscurity. I am looking out for this kid’s (or adult’s) well being.

    Yes, your method works to bypass a firewall, I have even used it myself many times. But it is absolutely not the best option here. And before you ask for credentials again, yes, I have network security experience in multiple domains, including corporate provided POC exploits for software you would know the names of, threat modeling for highly sensitive data, and organization and management of certified systems, along with knowledge of school network infrastructure.