Could always plug it in temporarily; do what you gotta do, then remove it again.
Darkassassin07
... Sata DVD-ROM drives are a thing
Hell I've still got one just in case
So... If a bunch of friends and I just fill up a roundabout with our cars, just going round and round...
Straight to jail.
If the sarcophagus still has 'juice' in it, I think you might be a little early for archeology....
Pretty sure that's just grave robbing
A paid plex share is a plex server that someone is running + selling access too.
This is against plex' terms, gets plex accounts banned; and in some cases, Plex (co) has taken rather drastic action by blocking entire VPS providers from reaching plex.tv; thus plex server software no longer functions on those VPS's at all.
Naturally, people selling shares want to maximize profit, so they use VPS providers on the cheaper end; resulting in cheaper VPS solutions being blocked for everyone.
Drink less paranoia smoothie...
I've been self-hosting for almost a decade now; never bothered with any of the giants. Just a domain pointed at me, and an open port or two. Never had an issue.
Don't expose anything you don't share with others; monitor the things you do expose with tools like fail2ban. VPN into the LAN for access to everything else.
and using DDNS
As in, running software to update your DNS records automatically based on your current system IP. Great for dynamic IPs, or just moving location.
Sure, cloudflare provides other security benefits; but that's not what OP was talking about. They just wanted/liked the plug+play aspect, which doesn't need cloudflare.
Those 'benefits' are also really not necessary for the vast majority of self hosters. What are you hosting, from your home, that garners that kind of attention?
The only things I host from home are private services for myself or a very limited group; which, as far as 'attacks' goes, just gets the occasional script kiddy looking for exposed endpoints. Nothing that needs mitigation.
Unless you are behind CGNAT; you would have had the same plug+play experience by using your own router instead of the ISP supplied one, and using DDNS.
At least, I did.
I'd be curious to know more about the methods used.
Did they somehow spread an infection through the bittorrent protocol, or was there an alternate route used?
How exactly did the malware arrive on consumer devices?
Because library patrons are the ones setting military policy ofc.... Glad the message is reaching the right people.
This is still a thing in the US?
Canada abolished that crap years ago... Phones are sold unlocked, and any remaining locked phones are required to be unlocked free of charge just by asking the Carrier.