#11
|
||||
|
Quote:
stop trolling this guy into getting fired. that's over the line. | |||
|
#12
|
||||
|
Quote:
I must not be a real woman if I was capable of dominating them, etc...it's a misogynist typology really. I've seen it manifest irl and it made me concerned for my safety. Creep behavior, but I try not to blame. There really is a lot of toxicity embedded in most boys' masculine programming. Most NPCs will never overcome; all we can do is raise the next generation of Lulzes with learned lessons in mind. Lulz is susceptible to addiction to short-loop dopa cycles. It's kindest to him to just freeze him out when he starts mashing that lever I think. And I don't particularly need moral support to endure his meltdowns. but ty ^^ More importantly, op, DON'T play eq at work over RDP. Any good IT guy's heuristic will see data transmission resembling videogame patterns and do a deep-packet analysis that will bust you cold. | |||
Last edited by America; 10-25-2018 at 01:32 PM..
|
|
#13
|
||||
|
Quote:
(Hint: smart people were never on "help desk" like you were. They went straight to being engineers) | |||
|
#14
|
||||
|
Quote:
And I'm sorry I wasn't born as priveleged as you. I had to work hard to become the computer engineer I am today, my dream since childhood. And I did it all while in the wrong sex's body. I won't see my long ascent to this pinnacle station as a point of shame no matter how discharitably you characterize it. | |||
Last edited by America; 10-25-2018 at 01:41 PM..
|
|
#15
|
|||
|
Ip logs do not show transmission patterns. I sincerely hope your employer doesn't read this or you'd be fired for being incompetent at your "computer engineer" job (which sounds fake). Can you just stop pretending you know what you're talking about?
| ||
|
#16
|
||||
|
Quote:
| |||
|
#17
|
||||
|
Quote:
| |||
|
#18
|
||||
|
Quote:
How can they even trace packets on a computer that isn't even in their own network? If they are connecting to the PC via WAN then how can anything be traced? I don't think they can trace anything unless his home PC is on the company's VPN, using their gateway or there is a security hole in Chrome RDP. | |||
|
#19
|
|||
|
Chrome RDP doesn't work like other incantations of RDP. It runs virtual applications, cloned from RAM of the viewed PC, locally on the viewer machine and superimposes them over cropped jpgs or png or whatever sent from the viewed PC. That way the images transferred can be much smaller, and bandwidth constraints are much less an issue. It's a wild implementation. Side effects, of course, Google gets to read the state of the applications and track user behavior thoroughly for advertising. And the traffic can be read by IP log and deep package inspection as though the remote machine were local. Check out the docs, chrome rdp is wackadoodle af.
| ||
Last edited by America; 10-25-2018 at 04:14 PM..
|
|
#20
|
|||
|
For anyone about to fall for this fraud, the above rant is a technobabble rant of helpdesk peon who is daydreaming about how networks actually work. "Cloned RAM" is the 3rd dumbest thing I heard today, right behind "it's IP logs", no wait it's "deep packet inspection"!
| ||
|
|
|