• 0 Posts
  • 38 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle



  • Nate@programming.devtomemes@lemmy.worldIt's beautiful
    link
    fedilink
    English
    arrow-up
    54
    arrow-down
    2
    ·
    2 months ago

    Ctrl + shift + alt + win + any letter opens office apps

    • W - Word
    • P - PowerPoint
    • T - teams
    • N - OneNote

    …etc

    LinkedIn just happens to be L. If there isn’t an app installed (or available) it’ll just open in your browser.

    I actually found these a few years ago when I decided to press every modifier letter combination. Back then it wasn’t documented anywhere but I’ve seen it pop up a few times in the last month so somebody must’ve found and shared it recently




  • I just moved into a house with my friend and he gave me full reign to smart home the house. Every light has an Innr Zigbee bulb, which are great for having colors during parties and color temperature throughout the day (Adaptive Lighting in HACS), as well as motion controls in the hallway (which has a broken 2 way switch) and kitchen. The front porch light turns on when I come home if I’m on foot, and the back porch light comes on if I’m driving. The lights in the living room turn down if something’s playing and it pauses if I leave the room. We’ve got an old android tablet I stole from the trash on the kitchen wall for a shopping list as well as an overview of the house. They washer and dryer have vibration sensors so we get an alert on our Google homes when our load is finished (we’re both forgetful as fuck). I had an extra contact sensor left over from the doors that I put on the mailbox, so we get a nice AOL “you’ve got mail” when the mailman comes.

    Frankly I don’t know how I survived without automation. I forget things so much less now.














  • It’s not “best practice”, but a compromised key is a compromised key whether that key is used to connect 1 or 100 computers to a server. No, I can’t shut off access to exactly one machine, I do not however have any difficulty in shutting off access to every machine and replacing it with a new key. Your system and my system are no different with a single compromised key.

    If I had 100 computers that I had to change identity files on each time it was compromised, and my keys were being compromised often, I would see a benefit from using multiple different keys.

    Quit acting like I’ve left the front door to my house open when the door is locked but my roommate and I share the same key.