

I suppose it has more to do with the opportunity for a significant breach. The healthcare provider’s email system is a big target full of exploits. Fax is also HIPPAHIPAA compliant, email is not.
I suppose it has more to do with the opportunity for a significant breach. The healthcare provider’s email system is a big target full of exploits. Fax is also HIPPAHIPAA compliant, email is not.
Need a simple end to end encrypted email solution, and for regular users to understand that solution isn’t Gmail for fax to die. The health and financial sectors are keeping fax alive, and it isn’t completely their fault.
Most people are unaware of how most things work.
Reminds me of Matt Berry as Lazlo in What we do in the Shadows.
The last time I went to an oil change place, I wanted it done because I was leaving town the next day. I usually have my regular mechanic (who is excellent and honest; a rare breed) do it, or I do it myself.
The ten minute oil change took an hour and change. They tried to upsell me on a bunch of bullshit and gave me stink eye when I politely told them I just need a conventional oil change, thanks.
They overfilled it by about .75 of a quart. I had to take care of that myself before the aforementioned road trip. The car only holds about four quarts in total.
They charged twice as much as my mechanic who knows what he’s doing and gives a shit. Never again.
I think OP’s screenshot is tactful and effective. It’s similar to my approach. Which starts:
“Thanks for the invitation, what’s on the agenda?”
Then I decide to accept or politely decline and ask for minutes.
What if you enjoy your work and find value in it; and the meeting is pointless bullshit that just breaks your focus?
Do they ever test anything that’s not on a huge screen before rolling to prod?
I feel this way all the time. I used to have to tell my (often less experienced) coworkers “that’s unusable on a device, which is how 75% of our traffic will consume it.”
It was usually because it looked nice on a huge monitor, and in an emulator.
There’s also that period before you leave when you prepare to be away from home all day, and the period after you return home when you decompress. Most people aren’t magically relaxed after dealing with the commute home.
It used to take three hours of my waking life per day. About 18% of my weekday life. 540 hours per year. At $40/hr that’s 21k of free money to the house. FWIW I’d rather have that time to myself and family, but there’s the number.
It’s right there in the name, but then there’s CFML, which is unpopular, but it definitely features logic, variables, and data manipulation.
We also dial the phone and roll down the windows. I guess some phrases transcend time.
Fuji makes some really nice SLRs, and their glass is exceptional. Also, you don’t need to install software if you don’t want to.
Found the dev.
Not all of them anymore. Verizon doesn’t, for example.
If you don’t know what you’re doing, hosting an email server will not be a good time. It’s very easy to produce an environment that is easily exploited.
A somewhat inexpensive shared hosting plan allows you to host your own email though. I get it done for <$100/yr. and have little to no limitation over self-hosting.
deleted by creator
Gotcha. Then maybe it is time for them to have a conversation with the friendly network administrator. You might have lost your logs, but university network appliances usually log alot.
Perhaps it’s something that I’m missing. What do you mean when you say their email is confirmed?
Usually when this happens, it’s a result of someone taking advantage of an application vulnerability, e.g. sql injection. Sometimes it’s more serious, like a script uploaded and a privilege escalation to execute it. The email value written to your database could be anything.
Not to condescend, but this is a good learning experience. If they were able to write to your db, they could likely also read from it, dump the whole thing and harvest the data.
How can you determine that someone didn’t use their info as subterfuge? It sounds like most people could find that information and use it. You’ll need a little more evidence.
Personally, I’d ask them if they want to pen test my next application and see how they respond.
I like to go bottom up. If chocolate and coffee are off the menu, I’m not sure this life is worth continuing.