lungdart

joined 2 years ago
[–] lungdart@lemmy.ca 8 points 2 years ago (4 children)

I use Ranger day to day and just access external volumes from their automatic mount points in /media, or I mount them manually to /mnt.

It works for me!

[–] lungdart@lemmy.ca 9 points 2 years ago (1 children)

Canada has two land borders now. Get with the times!

[–] lungdart@lemmy.ca 15 points 2 years ago

Because this isn't a FOSS discussion community.

[–] lungdart@lemmy.ca 1 points 2 years ago

You could always add them to the allow list so they don't get blocked.

[–] lungdart@lemmy.ca 9 points 2 years ago

Sorry to hear that.

[–] lungdart@lemmy.ca 0 points 2 years ago (1 children)

Not all militaries function in this way. I'm sorry yours does.

As an example, Israel has the concept of Rosh Gadol which empowers members of it's service to be better than the system itself.

[–] lungdart@lemmy.ca 3 points 2 years ago

All software ads exploits. Antivirus software mitigates already exploited systems.

And yes, some antivirus programs are infamous for being difficult to work with, but also remember that any vector that allows a user to easily override antivirus features can also be done by malicious software.

[–] lungdart@lemmy.ca 16 points 2 years ago (2 children)

Moving the port doesn't reduce attack surface. It's the same amount of surface.

Tailscale is a bit controversial because it requires a 3rd party to validate connections, a 3rd party that is a large target for threat actors, and is reliant on profitability to stay online.

I would recommend a client VPN like wireguard, or SSH being validated using signed keys against a certificate authority your control, with fail2ban.

[–] lungdart@lemmy.ca 13 points 2 years ago (3 children)

This is not true and bad security practice.

There are exploits that can be installed without a mistake made on the users part, the user can make a mistake, and almost every user downloads and open files regularly.

Windows is less secure than the other options, but the other options are not impenetrable. The biggest botnets are made of Linux IoT devices, and nobody opened the wrong email on they're thermostat...

What a virus scanner will do is check your filesystem and possibly program memory for known footprints. A tool like this can save you from becoming a node on a botnet or being crypto locked. More importantly, if you work from home it can save your company from this issue as well!

[–] lungdart@lemmy.ca -2 points 2 years ago (4 children)

I think mandatory military service is likely a good thing for a population (maybe not the individual). With a highly trained population, volunteering would likely increase and reduce the need for conscription during times of war.

The benefits of military service for young adults are numerous. Discipline, exercise, comeradity, professional exposure, etc. Could reduce some of the mental issues we see due to isolation through technology. Of course I'm taking in peace time.

[–] lungdart@lemmy.ca 22 points 2 years ago (3 children)

Sounds like you were out of resources. That is the goal of a DoS attack, but you'd need connection logs to detect if that was the case.

DDoS attacks are very tricky to defend. (Source: I work in DDoS defence). There's two sections to defense, detection and mitigation.

Detection is very easy, just look at packets. A very common DDoS attack uses UDP services to amplify your request to a bigger response, but then spoof your src ip to the target. So large amounts of traffic is likely an attack, out of band udp traffic is likely an attack. And large amount of inband traffic could be an attack.

Mitigation is trickier. You need something that can handle a massive amount of packet inspection and black holing. That's done serious hardware. A script kiddie can buy a 20Gbe/1mpps attack with their moms credit card very easily.

Your defence options are a little limited. If your cloud provider has WAF, use it. You may be able to get rules that block common botnets. Cloudflare is another decent option, they'll man in the middle your services, and run detection and mitigation on all traffic. They also have a decent WAF.

Best of luck!

[–] lungdart@lemmy.ca 3 points 2 years ago

kernel version beyond 5.6, so it doesn't allow any modification

Wut?

view more: ‹ prev next ›