While I firmly disagree, I don't have any isssue with people who want to see autism as a positive thing. How we come to terms with our humanity and the shitstorm that is society is a personal process.
But when you project your attitude onto others without thinking you end up discriminating. Even if you don't consider autism to be a disorder, it's still comes down to whether or not it's a fact, and you are not in position to make that claim. It's really not about autism being good or bad, it's about the claim and how others feel about it. And these days convincing someone they have autism when they don't can be extremely dangerous and life threatening so maybe don't casually bring it up. I don't want to see this shit on PLUG. This is an online text-only format with a specific focus on Linux conversations so if you want to get into the prevalence of autistic nerds in the IT world feel free to take it to PLUG-TALK. I'm the last person to dictate politeness on any online forum but I'm gonna sit my ass down on this hill and say that bringing statements about mental health into a discussion about linux network monitoring is crossing multiple lines. If any PLUG old-timers want to get cranky about my attitude I'll show myself the door. :) And for the record, thanks for taking a day to write an honest and significantly less toxic response. Most people would have doubled down on their BS rather than explain it. -Ben ------- Original Message ------- On Sunday, April 23rd, 2023 at 3:23 PM, Ted Mittelstaedt <[email protected]> wrote: > Well as I have been on the autism scale myself since I was born and I have > read quite a bit about it in an effort to understand what my differences are, > I perhaps have a radically different view of it than you do. It is not a > disorder unless someone is severely autistic. It is, in fact, an evolutionary > advantage that has become more prevalent in humans for the simple and obvious > reason that it gives people who have "mild" cases of it the ability to be > highly successful with technology and machinery as well as music and the > arts. As humans have become more civilized, people with the genetic group > that causes autism have out competed people that lack this. Einstein for > example is a textbook example. I've worked in high tech since 1994 and the > most successful programmers, engineers, it people, - the "techies" of the > world - are all on the scale. That is after all what the word nerd was coined > to describe. So I am actually rather proud of being on the scale and I DONT > regard having it negatively. I'm sorry you do and I hope you can eventually > realize your view of it being a disorder is discriminatory. IMHO the biggest > proponents of the idea that mild autism is a disorder are old school > educators who's main goal in life is getting kids in school to sit down and > shut up. Happily that view is gradually changing but it's clear we still have > a lot of work to do. > > Get Outlook for Androidhttps://aka.ms/AAb9ysg > > ________________________________ > From: PLUG [email protected] on behalf of Ben Koenig > [email protected] > > Sent: Saturday, April 22, 2023 5:29:40 PM > To: Portland Linux/Unix Group [email protected] > > Subject: Re: [PLUG] 3rd party vpn Defense evasion > > ------- Original Message ------- > On Tuesday, April 18th, 2023 at 8:38 AM, Ishak Micheil [email protected] > wrote: > > > > > Greetings, > > I am tasked to identify a solution to detecting users obfuscating their ip, > > using verity of VPN services. > > > > What we've done > > - Prevent users from installing software (VPN Cliens) > > > > - Possibly having a code on endpoints, to collect ip addresses tied to wifi > > or LAN connection prior to attaching to VPN service, > > > > any other ideas? > > > > Some people want to debate this ass some sort of political issue, but it's > pretty straight forward. This usually is more of a concern at SMBs that don't > want to splurge for company managed hardware and ask their employees to BYoD. > This then creates anxiety among managers that gets projected down to IT. > > If you control the VDI system, then you have the ability to see who is > connecting. At most companies the VPN software used to connect to the VDI is > ALSO company managed, so you can see that too. > > So, you log all accesses to the VPN on the server side and monitor for > trends. You may not be able to stop an employee from giving out access > credentials, but you can see when the IP address used to connect the VPN > changes. From here, you implement Zero-trust policies where only known IP > addresses are able to access the network because you know the IP address, but > may not have logged it effectively until now. > > There are additional layers of control you can add but it ultimately comes > down to what a given company is willing to provide for their > employees/contractors. I've worked with systems that would make the kind of > subcontracting you describe very difficult but in those cases you end up with > the employer buying a special wifi router for their staff. A lot of managers > will ask for a magical fix without understanding how much effort it takes to > lock this down. For us in IT sometimes we just need to map out all the things > that would need to be implemented and assign a $$$ value to them. Most > companies will decide not to bother at that point. > > > Think of it like an arms race, at what point does your user have to jump > through so many hoops that the act of enabling a subcontractor becomes more > work than the actual job? Or, we could be Ted and go off on abusive rants > about how IT people are autistic for even considering this type of solution. > ;) > > -Ben > > > > > P.S. Hey Denis, I would have posted this info sooner since it's a pretty > interesting question but was discouraged from doing so because Ted was trying > to shit on everyone. May the Facts be with me :)
