[-] damium@programming.dev 3 points 6 months ago

It depends on how the router responds to other non-forwarded ports. For UDP an open port with no response is the same as a dropped packet. A scanner will only know if the device sends an ICMP response back to indicate that it is closed.

[-] damium@programming.dev 3 points 8 months ago

If filesystem UUIDs are IP equivalents. Then device paths are MAC addresses. FS labels are DNS. Device mapper entries are service discovery.

[-] damium@programming.dev 2 points 8 months ago

There are a lot of edge case characters around visually indistinguishable names. If that is a concern usernames should use a restricted known character sets instead of trying to block specific characters. You likely should also treat lookalike characters as equivalents when checking for username overlap.

[-] damium@programming.dev 2 points 9 months ago

Likely you needed to include the intermediate cert chain. Let's encrypt sets that up automatically so it's quite a bit easier to get right.

[-] damium@programming.dev 2 points 10 months ago

There is also SMS passive reading using LEO intercept. Hacked police email accounts are used to gain access to carrier systems where they use "imminent threat" no warrant lookups to pull the SMS in real time.

SMS is a terrible form of 2FA, better than none but not by much.

[-] damium@programming.dev 2 points 10 months ago

Fridges with a dial usually are an uncalibrated simple analog thermostat sensor (often a gas tube with a pressure switch) along with a simple analog control board. Fridges with a digital thermostat tend to use a calibrated sensor (usually a thermocouple) with a digital control board.

[-] damium@programming.dev 2 points 10 months ago

Yeah, I think that was it. I also played a heck of a lot of sudoku on it.

[-] damium@programming.dev 3 points 1 year ago

The expression syntax for the GNU find command is very powerful. I would expect that it is up to the task. If you don't have the GNU find command with it's extensions I could see how it's would be difficult.

[-] damium@programming.dev 2 points 1 year ago

If you want an automated system that can protect against ransomware your backups need to be hosted in some way where the backup server has control of the retention and not the client (NAS, local disk, etc are not sufficient). If your NAS supports automated snapshots that can't be deleted by the backup user it can mostly fill this gap but may need to be checked for how it handles snapshots when the disk fills.

For self-hosted solutions I've used BURP, Amanda, and Borg backup in the past but have switched to Proxmox backup server as my VMs all run in Proxmox. You still need to consider full disaster recovery scenarios where both your primary and backup system fail. For this PBS sports both tape and remote server replication.

There are also many cloud solutions that do this automatically. For cloud I would always use them in tandem with some kind of local backup.

For all of these they should have an admin account that has strong protection and doesn't share credentials with any of the primary systems.

[-] damium@programming.dev 3 points 1 year ago

Are they on a local disk? Thunar doesn't render any thumbnails for remote storage by default.

[-] damium@programming.dev 2 points 1 year ago

You can still enter audit mode and change some registry settings to switch to a local account. Last time I did an 11 install on a device with Wi-Fi it also let me create a local account after trying to continue with a blank password a few times.

[-] damium@programming.dev 2 points 1 year ago

When rsync copying the active root I like to bind mount / to /mnt/root_fs first. This avoids the issue with needing to exclude folders with sub-mounts and will expose files to copy that might be hidden by the mounts.

view more: ‹ prev next ›

damium

joined 1 year ago