Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)DE
Posts
0
Comments
72
Joined
2 yr. ago

  • Indeed. Everything is stored in plain markdown files you can move around and edit elsewhere. I'd like to use a FOSS alternative when I can, but second best is something I can easily jump ship from and not lose data.

  • As others have suggested I would stick to internal only until you're comfortable. Dealing with automated port scanning from all over the globe is a nightmare if you aren't running a tight ship, and a collasal headache to deal with if they get in. I started with pihole, jellyfin, and some other simple docker services. Check out linuxserver.io if you go the docker route, they have good prebuilt compose files for you to use and the community has good info on their forums. You don't need a domain but it's preferred if you want to host something public-facing. Make sure you have fail2ban configured if you open stuff up to the web, it makes dealing with the automated attacks easier.

  • If you have more than one VPS to manage or multiple people that need access via SSH, you may want to look into using SSH certificates instead of keys. Keys get messy when you have to wrangle a lot of them and it's a real pain in the but if you need to revoke multiple. It does require more than just generating a key pair and giving it to the server to trust though.

  • Same here. Professor was an absolute clown too, his example HTML boilerplate for some project we had to do had © 1996 professor dipshit This was early 2010s. He also took points off my midterm one semester for not surrounding my JS with comment tags since, otherwise it wouldn't run on Netscape"

  • Those servers have teams of trained individuals whose job is to secure them and keep them bulletproof. It's a bit different from grandma downloading random crap on her Linux mint desktop to be fair.

  • You can't inspect encrypted packets, what China does is network traffic analysis - examining headers and figuring out patterns based on metadata. They don't care much about what's being transmitted if using a VPN alone is enough to land you in trouble.

  • YouTube series by BurningIceTech, and either spin up VMs yourself to familiarize with group policy, management console, services, event viewer, and basic CLI in Linux, or buy the labs from comptia. 1101 and 1102 are heavily focused on ports and protocol overviews, raid, windows settings, and basic troubleshooting. Take good notes since you'll build on the A+ stuff in Net+ and Sec+ if you take those too.