Skip Navigation

Posts
0
Comments
486
Joined
2 yr. ago

  • This has nothing to do with net neutrality. Either you didn't read the article, you didn't understand what you read, or you don't understand what net neutrality means.

    To your credit, the use of "throttles" in the headline is (likely intentionally) deceptive. It's the wrong term entirely. What Xitter did was make their own servers wait ~5 seconds before serving an http redirect.

  • Fire up an instance and federate with whatever you want.

  • I can't edit Word documents for shit lol. I edit everything using Markdown (the same formatting used here) because I don't have to think about it.

    That said every job can get stressful now and again, and this line of work is no different, but most days it's just work. Make this change, make this thing do something else, kill this thing that's costing money and everyone stopped using last year without telling anyone, etc. Typical things.

  • Computers communicate across networks using ports. Port 22 is a commonly used remote administration port called ssh. Bots go around probing computers with an open port 22 hoping to find badly secured or outside misconfigured ssh servers to turn them into bots and crypto miners, etc.

  • Your own Lemmy instance.

  • Honestly that spin sounds like a pretty good reason to keep the media out.

  • Well, I was already planning to spin up my own instance. Guess this is as good of motivation as I needed.

  • It's not uncommon for people to try using it as their sole authentication so that wouldn't be a surprise. But for it's purpose, it's perfect.

  • It is and it isn't. It prevents random scans from opening 22 and attempting to authenticate, that's basically the entire purpose. You still need good authentication after because you're right, it's not a security measure, it's just a way to keep your logs useful and to keep botnets from beating the hell out of 22.

    By "good authentication" I mean a key pair based authentication. That is impossible to brute force. If you use a password on 22 you shouldn't open it at all and you should rethink allowing any remote access.

    Put another way: You're the doorman at a speak easy. You can answer the little window with "what's the password?" to every jack ass that approaches, and you'd be asking all the time. But if they don't know they have to knock "shave and a haircut" first, your job gets a lot easier and you're dealing with a lot fewer nuisance password promptings.

    You can also use it to blacklist. If someone tries to hit 22 without knocking you can blacklist that IP entirely because you know it's nuisance.

  • If you do want to open 22, and there are plenty of good reasons to want to, just implement something called port knocking and you can do it safely.

    Note with this you still need good authentication. That means no passwords, key based auth only.

  • That's because it's geese and swans that are the war criminals. Ducks are little adorable, innocent, waddling, grape munchers.

  • God damn I just tried to read the Wikipedia page on Kaizen and I have never seen so many words used to describe nothing.

  • Oh interesting. I've seen their crawlers in my server logs, didn't know they were using it to augment Bing.

  • The question is whether voters turn out for against Biden or Trump.

    Nobody in America votes for anyone any more.

  • Google's results these days are shit. The other day I googled an exact terraform resource and included "terraform" in my search query. The first result should've been the page for that resource in terraform's documentation, but that page wasn't in the results at all. What was there was a blogspam copy of said page.

  • A volunteer force. It's not up to a president to tell people what they're willing to fight for.