Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)ST
Posts
0
Comments
637
Joined
2 yr. ago

  • OpenVPN is still a solid option and widely used today.

    Absolutely, but Wireguard is simpler to setup and comes by default and by design with a more secure default config.

    • Create keys on host and on clients
    • Generate a config
    • You now have a secure VPN Setup.

    Now look at all those options you need to tune on OpenVPN.

    even though the company behind it isnt perfect.

    But then why recommending pfSense? OPNsense is the same with a much more FOSS friendly company behind it. Yes pfSense is at the moment ok but no reason to use it over OPNsense imho.

    People should still be able to use whatever software they like without being juged by it.

    Yes. And i never judged anyone running thr software, only ppl who recommend it.

    Its better for people to at least start with something, rather than nothing

    I am not sure about it. Personally, when i get into a new topic i like to have comparisons. They show me what is actually relevant and what i should look out for. But maybe it is just me.

    I said multiple times "recommend" here, but that is actually my main problem, i would be much more ok when he simply said there is x and y also available but i use z because of 123...

  • This guide is heavily opinionated and simply outdated. 2 examples:

    1. use of openvpn. Wireguard is by design way more secure (use of keys instead of passwords) and is way more performant.
    2. use of pfSense. Yes pfSense is ok but the company behind it has shown it hostility towards open source and foss multiple times. Why should a beginner use PFsense when OPNsense exists. OPNsense is not even mentioned.

    And that are only 2 points i discovered while scrolling through. Louis is a great guy but as it looks like he should leave that topic to other people.

  • Yes they could also redesign the whole product for a few ppl who will plug it into an old PC that still uses vga or an old server that has no IPMI.

    You realise how big the VGA connector is relative to the product?

  • But other solutions work also. And all of those provide anonymity and are not a VPN. For example I2P, TOR and Seedboxes in other countries may even be paid anonymously.

    Pirates use anonymity in order to avoid being detected, and those tools provide anonymity.

  • The benefits of the nowadays VPNs are mainly privacy and piracy related.

    Piracy is actually not the reason to use a VPN, pirates use a VPN to be anonyme and not to pirate content.

    Similar as you would not say a hammer is a tool that can be used to hit something and not a hammer is used by construction wormers and burglars.

  • TLDR, the developers of pfSense are not the nicest people sometimes. If this bothers you, consider checking out OPNsense.

    So first the author is arguing around on the router section that you should not buy a cheap router but then goes for pfsense instead of opnsense, i understand that when you are used to pfsense that you may not want to switch but recommending it for new ppl is just stupid. They have shown their hostality against their OS community in the past see https://news.ycombinator.com/item?id=13615896

  • As it was already said. Docker is not virtualization. The number of Containers you can run depends on the containers and what applications are packaged in them. I am pretty sure you can max out any host with a single container when it runs computational heavy software. And i am also pretty sure you can run on any given host thousands of containers when they are just serving a simple static website

  • This does work anymore for some ISOs. Depending on the version and Region i actually could not continue without connecting it to the internet. The oobe\bypassnro does work more reliably.

  • Those attacks you see are mostly (close to 100%) harmless bots, scripts. Yes they are trying default passwords and exploits that got patched years ago.

    If you do not use default credentials and do run up to date software there is nothing to worry about.

    Even brute force attacks are rare.

    This is just "noise" so to speak.

    If you are scared by this, you should reconsider hosting something on the internet. Yes things like fail2ban can help but only if they knock on your server multiple times and mostly only to keep your logs clean.

  • So for port forwarding you need the port on the router the host and the port the traffic should get forwarded to on the selected host.

    So you are saying, when exposing a host then the host is reachable over internet but when using port forwarding it is not?

    How you check this? What commands/procedure?

  • Because in the local/private network are many hosts, like your phone, pc and your server. Exposing means that the device that is exposed gets basically everything forwarded what usually the router would handle. Exposing does expose a host to the WAN.

    Forwarding a Port only forwards the specified ports. You can use multiple hosts for that. For example you can port forward port 80 to your Phone to port 321 or whatever and port 443 to your server at port 20.

  • Because you pointed 2 programs at the same directory to sync the content with an external directory structure.

    In my experience adding an already existing directory structure to a sync program is a bad idea. Create the directory and then move the existing structure into it to be safe or/and at the very least have a backup.

    Not having a backup is on you. You got lucky this time.

  • NOTE: Scrutiny is a Work-in-Progress and still has some rough edges.

    Honestly, at this point i would not recommend the usage of scrutiny, the development was almost ways really slow and the creater does not seem to have kuch interest in the project. There are still standing issues and imho important features missing.

    I would look into prometheus+grafana or something of that sort.