cm0002@mander.xyz to Programmer Humor@programming.dev · 4 months agoZero Trust Architecturelemmy.mlimagemessage-square30linkfedilinkarrow-up10cross-posted to: programmerhumor@lemmy.ml
arrow-up10imageZero Trust Architecturelemmy.mlcm0002@mander.xyz to Programmer Humor@programming.dev · 4 months agomessage-square30linkfedilinkcross-posted to: programmerhumor@lemmy.ml
minus-squareSergio@lemmy.worldlinkfedilinkEnglisharrow-up0·4 months agoSimple solution: log the kid into your neighbor’s wifi.
minus-squareSSUPII@sopuli.xyzlinkfedilinkarrow-up0·4 months agoAs an early teen my parents turned off the WiFi router at night and when not in use. I eventually found the neighbor had an exploitable WEP router from an Android app, and I used it to continue watching Minecraft and Happy Wheels videos on Youtube.
minus-squaremoonshadow@slrpnk.netlinkfedilinkarrow-up0·4 months agoCongrats, pretty sure “mom took away my internet” is the primary entry point for IT professionals
Simple solution: log the kid into your neighbor’s wifi.
As an early teen my parents turned off the WiFi router at night and when not in use. I eventually found the neighbor had an exploitable WEP router from an Android app, and I used it to continue watching Minecraft and Happy Wheels videos on Youtube.
My son did this…
Congrats, pretty sure “mom took away my internet” is the primary entry point for IT professionals