The standard $12 subscription lets you share a folder. So I made a
"Company" folder with subfolders for each client. and shared the Company folder out.
For a small consultancy like ours, it works well.
$12 per month, or per year?
Also... how did you handle the LastPass breach?
Per year, and I changed my password. Nothing else needed. I do not have 2FA enabled because I feel getting a text or something to the same damned device I am logging in on defeats the purpose of 2FA. My current LastPass password is a phrase about 30 characters long or so. I have lastpass set to log out automatically when my browsers close, etc.
You can use google authenticator.
That's what I use. I do have it turned off for my phone tho, no point in having the device you get the code from require a code. Don't really use the phone version except to lookup passwords when I'm away from one of my normal computers/browsers.
A lot of places restrict the allowed characters because they're morons who don't understand SQL injection and think it's a way to avoid it. Ideally any character should be allowed that can be transferred over HTTP without breaking the hell out of things, which is everything which can be properly encoded.
I do trim passwords though, something old school jackasses think is bad, because after all, if there's a space at the beginning or end of a password, or a newline/return character, it must be on purpose, despite the fact that 99.9999999999% of the time it's because someone copy/pasted the password from an email or something and accidentally added on the space/\r/\n. Of course you can make the argument of never sending a password in an email (and we don't), but tell that to users who will do it all day long.
I also wrote a method to deal with "easy" passwords, things like repeating words, pattern recognition for phone numbers, birthdates, etc.
That's definitely different than other trusted sources lead me to understand.
Check your sources. Are they quoting the laundry list of 2013 (this article was 2014) references to the opposite being true? Looks like there was reason to believe it in 2013, but nothing substantial, so everyone repeated it. But it got put to the test in 2014 and proved to not be what people had been saying.
@scottalanmiller Social engineering is a great way to get what you want. Buffer overflows, unescaped SQL queries can be patched, people wanting to be "helpful" is an aspect of our culture and I imagine only by hiring the most irritating, least helpful people on the planet can you begin to really secure yourself against your own employees.
It is very useful (if you have Linux running on the box in some form, or vSphere which is similar enough.) However, it turns out that some ILO firmware editions don't work with this and cannot be reset without being patched first. Important to know.
Thanks for the heads up.
Looks like your connection to MangoLassi was lost, please wait while we try to reconnect.