@lungdart@lemmy.ca avatar

lungdart

@lungdart@lemmy.ca

This profile is from a federated server and may be incomplete. Browse more on the original instance.

lungdart,
@lungdart@lemmy.ca avatar

Doubt. You probably need to set the file owners in your volume to the same user running in the container.

lungdart,
@lungdart@lemmy.ca avatar

I’m using pass at home, but I’ve used hashicorp vault at a few jobs with great success.

IBM just forked it to openBao as well to get around the business license, if that’s a concern for your. But honestly I’d trust hashicorp more than IBM at this point.

How to get past theoretical knowledge?

I am currently trying to learn cyber security, specifically pentesting. I also do blue team things now and then, but not too often. I’ve started about 2 years ago with programming in python, later golang. I feel like I am decent in both. However when it comes to pentesting and security in general. It doesn’t feel like I’m...

lungdart,
@lungdart@lemmy.ca avatar

It can take years of practice. Keep at it, everyone feels this way, and the ones that don’t break through are the ones that give up

lungdart,
@lungdart@lemmy.ca avatar

Wireguard is e2e encrypted, no middleman can inspect the packets without the private keys.

lungdart,
@lungdart@lemmy.ca avatar

You can try putting it on pretty 443 or another tls port. It’s not a perfect solution but it could help for your specific setup.

lungdart,
@lungdart@lemmy.ca avatar

discord.com/servers/8311-886329492438671420

Get rid of their junk equipment and put something decent in. Discord link is a group dedicated to doing just that. You may find info for your specific ISP.

If you do it right, you won’t even need their gear inline at all.

lungdart,
@lungdart@lemmy.ca avatar

What are your hobbies, go find where people do then together and join in.

If you don’t have many hobbies, try something new that may pique your interest.

Unfortunately most people your age are going to be at parties, university, and sports. You’re limiting your chance of success by removing those options, do it’s going to be hard. You’ll have to put in the work.

lungdart,
@lungdart@lemmy.ca avatar

Let me rephrase. The chances for friendships for people who enjoy these activities are significantly greater for people who don’t at.

OP could force themselves to attend, and possibly make friends that way, but it’s very likely the friends will want to continue to do those things.

I would also like to remind people that the way you are is not set in stone. You can change if you want to. I used to be an introverted loaner who worked on being extroverted and accomplished it. It’s what I wanted though, I idolized extroverts. This may not apply to OP

lungdart,
@lungdart@lemmy.ca avatar

Most people can change, and do. Most people can’t prevent it. Change is one of the only constants in life.

You sound like you have extra challenges with autism. If this is something that is negatively affecting your life, I would recommend looking into a counselor or therapist.

Best of luck. To both you and OP.

lungdart,
@lungdart@lemmy.ca avatar

What are the odds an extraterrestrial being would have the exact same features as most mammals on earth?

And why is it made of playdoh?

lungdart,
@lungdart@lemmy.ca avatar

We have a team of 6 and rotate on call regularly. I’m in the US and receive no benefit for on call specifically, but other regions do. My salary more than covers the inconvenience though.

lungdart,
@lungdart@lemmy.ca avatar

I would spend my time the same way. Honing my specialization to increase benefit to society. I love software development!

lungdart,
@lungdart@lemmy.ca avatar

I use Ranger day to day and just access external volumes from their automatic mount points in /media, or I mount them manually to /mnt.

It works for me!

lungdart,
@lungdart@lemmy.ca avatar

Human chess!

Grappling is great because not only do you need to learn strategy, patience, set ups, push pull, etc; you also have to train your body to do what your mind is thinking.

If the body is capable but the mind is weak, you suck. If the mind is capable but the body is weak you suck. And if both are weak, your just like me!

Also it’s gender semi neutral. Women can absolutely dominate against men using skill. Same with Davids vs Goliaths.

lungdart,
@lungdart@lemmy.ca avatar

Do body weight exercises at work instead of Lemmy.

Only if you want to though.

lungdart,
@lungdart@lemmy.ca avatar

Canada has two land borders now. Get with the times!

lungdart,
@lungdart@lemmy.ca avatar

Hmmm. If you can get the green skin covered up and trim those eyebrows you’d be closer to Hugh Laurie, but I’m not too sure.

lungdart,
@lungdart@lemmy.ca avatar

Moving the port doesn’t reduce attack surface. It’s the same amount of surface.

Tailscale is a bit controversial because it requires a 3rd party to validate connections, a 3rd party that is a large target for threat actors, and is reliant on profitability to stay online.

I would recommend a client VPN like wireguard, or SSH being validated using signed keys against a certificate authority your control, with fail2ban.

lungdart,
@lungdart@lemmy.ca avatar

This is not true and bad security practice.

There are exploits that can be installed without a mistake made on the users part, the user can make a mistake, and almost every user downloads and open files regularly.

Windows is less secure than the other options, but the other options are not impenetrable. The biggest botnets are made of Linux IoT devices, and nobody opened the wrong email on they’re thermostat…

What a virus scanner will do is check your filesystem and possibly program memory for known footprints. A tool like this can save you from becoming a node on a botnet or being crypto locked. More importantly, if you work from home it can save your company from this issue as well!

lungdart,
@lungdart@lemmy.ca avatar

All software ads exploits. Antivirus software mitigates already exploited systems.

And yes, some antivirus programs are infamous for being difficult to work with, but also remember that any vector that allows a user to easily override antivirus features can also be done by malicious software.

lungdart,
@lungdart@lemmy.ca avatar

Sounds like you were out of resources. That is the goal of a DoS attack, but you’d need connection logs to detect if that was the case.

DDoS attacks are very tricky to defend. (Source: I work in DDoS defence). There’s two sections to defense, detection and mitigation.

Detection is very easy, just look at packets. A very common DDoS attack uses UDP services to amplify your request to a bigger response, but then spoof your src ip to the target. So large amounts of traffic is likely an attack, out of band udp traffic is likely an attack. And large amount of inband traffic could be an attack.

Mitigation is trickier. You need something that can handle a massive amount of packet inspection and black holing. That’s done serious hardware. A script kiddie can buy a 20Gbe/1mpps attack with their moms credit card very easily.

Your defence options are a little limited. If your cloud provider has WAF, use it. You may be able to get rules that block common botnets. Cloudflare is another decent option, they’ll man in the middle your services, and run detection and mitigation on all traffic. They also have a decent WAF.

Best of luck!

lungdart,
@lungdart@lemmy.ca avatar

kernel version beyond 5.6, so it doesn’t allow any modification

Wut?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • khanakhh
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • everett
  • ngwrru68w68
  • Durango
  • JUstTest
  • InstantRegret
  • GTA5RPClips
  • modclub
  • cubers
  • ethstaker
  • osvaldo12
  • cisconetworking
  • tester
  • anitta
  • provamag3
  • Leos
  • normalnudes
  • lostlight
  • All magazines