• 0 Posts
  • 54 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2023

help-circle







  • Turn off broadcast of the SSID

    Don’t do this. It provides zero security, and just reduces usability. Now you should call your SSID something non-identifiable. So instead of “$YourName Wifi” call it “pleasure chest” or something. Additionally do not set a ridiculous 64 character + special characters password, because again you are providing next to zero additional security, while hugely reducing usability.

    Use a simple password scheme of 3-5 unrelated common words like from here: https://www.correcthorsebatterystaple.net/index.html for your wifi password.


  • I guess having a thick provisioned VM image on your laptop means that you are hiding something. Again if the evil government you are trying to hide something from doesn’t need reasonableness as a reason to detain you, then who cares? No matter what you do you are rolling the dice every time you interact with them.

    Which is of course similar to the US today, so if I needed to hide something from them I’d make sure that once i’m legally compelled to give my password they at the very least wouldn’t have what they are looking for, since there is no way I could prove I didn’t have it anyway.





  • I’m a network engineer and I run ipv6 natively in all of our datacenters. There are even a handful of end systems that have ipv6 native networking stacks with ipv4 sockets for our non-ipv6 compatible applications. IPv6 issues are basically self-inflicted at this point by companies that see their IT systems as cost centers, or by basilisk directors who’s knowledge stopped in the 90’s.


  • PowerCrazy@lemmy.mltoLinux@lemmy.mlSSH as a sudo replacement
    link
    fedilink
    English
    arrow-up
    26
    ·
    edit-2
    4 months ago

    Seems novel. But from a security aspect, if OpenSSH has security vulnerability that allows an unauthenticated user to login, via whatever means, once you are in the system as a non-privileged user, you are now free to use the same vulnerability to get root.

    Basically this exercise is like using two locks that have the same key to open them. If the same key opens them, then a weakness in one, is now a weakness in the other so why bother with two identical locks?


  • I dont’ understand the issue here. Is that picture part of some specific VPS’s logo or is it part of the title/theme of the article? I think it’s very poignant, though obviously edgy, if it’s the latter. If your VPS provider isn’t censoring content, then obviously that means Nazism will be able to exist along with militant socialism advocating violence against capitalism. That is kind of the point of the article right? To determine which VPS is actually not going to censor.



  • PowerCrazy@lemmy.mltoComics@lemmy.mlOnly telling people my height in cm from now on
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    5 months ago

    You said the metric system has tons of great subdivision which is objectively false. Prefixes in the metric system only multiply by 10, which by definition does not and cannot add additional sub-divisions. The point is that while the metric system is a useful system of measurement in very limited situations, the biggest advocates for it have no idea why they like it, and are ignorant of it’s deficiency’s.

    Let’s try to raise the discourse a bit. Divisors are absolutely the most important part of a human-centric numeric and unit system, and the metric system, being a base 10 system, absolutely sucks at that.