• 0 Posts
  • 17 Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle

  • A bit late to your comment but they simply don’t want you to talk to a human. It’s that easy. Talking to a human results in empathy, which results in giving away of deals the management doesn’t really want you to give out.

    They’d rather you get frustrated at being able to not reach a human and then you just give up and be a good sheep and pay what you’re expected to.

    Oh, unless you want to cancel, in which case it will take no less than 10 different humans bouncing you off various departments and scripts because making it easy to cancel also results in bad metrics




  • liara@lemm.eetoTechnology@lemmy.worldUnity apologises.
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 year ago

    This is called the “Door in the face method” of bargaining. Start with a request so high and absurd that you “slam the door in their face” because it’s so absurd.

    The next time they try, they’ll come back with an offer that sounds far more reasonable than the original request. Since you’re still primed with the previous context, your brain makes it sound less bad than it probably is ("At least it’s not the first offer!). You’re more likely to accept after this.

    The opposite technique is called “foot in the door”, start with a small request (get your foot in the door) and then increase the ask after the small request goes over.



  • I don’t really use it for this, but here are some things I do use it for:

    • metrics scraping on servers without needing to open ports or worry about ssl encryption. Works great for federating Prometheus instances or scraping exporters
    • secure access to machines not directly exposed to the internet. I.e. ssh access to my home box while I’m traveling
    • being an exit node for web traffic while traveling. I.e. maybe you are traveling and have a bank who is giving you grief about logging in – masquerade that connection from your home IP

    I mostly just use it for metrics scraping though


  • It sounds like what you want is to either get a modem (either rented through the ISP or bought 3rd party, if your ISP supports it) and then ensure that this modem is in bridge mode without any sort of router features. That said, most places will just give you a dumb modem if you have no intention of using their router.

    Then the other gear would be a router with the feature set you want. I personally am quite fond of my Mikrotik hap ac2 but the ac3 looks good too. I don’t use the Mikrotik for the wifi either (I use unifi for that), but it’s decent enough for a small space in a pinch.

    Basically you would need to find out from your ISP if they allow you to bring your own gear – modem and/or router, with the router being the more important of the two and get their help to either swap your existing device into a bridge or getting you something that can.





  • it doesn’t cost money and you can use it for anything you like.

    This is misrepresenting FOSS quite a bit. A lot of open source software is indeed this permissive, but not all of it. It’s important to refer to the license of each individual project because various licenses have different terms.

    Some open source software may be free for personal use, but that license may not extend to other companies seeking to profit off their open source and good will. ZeroTier comes to mind as an example of this.

    Further, other licenses like GPL only requires that you make your sources available upon request but you can require that your customers pay you to receive the product: i.e. RHEL. At the end of the day, FOSS means free as in speech, not free as in beer





  • Going to play Devil’s advocate here, but open source does not automatically mean that things are safe or that anyone is even auditing the code on anything that resembles a regular basis.

    Heartbleed was introduced into OpenSSL source code in 2012 and wasn’t discovered and fixed until 2014