@neural_meduza Скорее наоборот 😔
@neural_meduza Боюсь, что вот именно с миром и достатком в этот НГ в РФ будет напряжённая ситуация 😏
@aster
NixOS is the system that relies on containerization heavily and that inspired, Guix, right? Yes, that's pretty cool. Even better!
But most of us here are into bittorrent anyway. I have a dedicated box with Void PowerPC running transmission-daemon. There's no fun in seducing someone like that, I guess 😅
@newt
@sunchaser
Профессиональное выгорание налицо! И новости опасно похожими на реальные стали 😅
@neural_meduza
@aster Looks like I'll be staying for at least a week till this 40 Gb download get finished 😌
What are we having for dinner?
@thor At least you don't have to get the garbage collector involved 😁
@fcktheworld587
@thor
I don't remember it very well, but isn't it this movie's epitasis, the Vanilla Sky?
"When you sleep with someone, your body makes a promise whether you do or not" — it did have something like that, right?
Now that I think about it, it's not too uncommon 🤔
@gemlog
> Determined actors will nmap you regardless
Keep them entertained with fake sshd's 🤣
I've seen this neat trick on Mikrotik routers, you set up a random port number and when you try to open it the packet still gets dropped, but it makes an opening in firewall for five minutes so you can ssh in from this address. To be honest, I think it's overkill, but it's really inventive!
> Some of those buildings don't even exist anymore even.
Ghost story passwords, nice vibes!
@thor
Got me! There are things even spell checker can't fix 😅
@thor
TBH it's not too hard to imagine that. Come on, they were engaged and all the relatives had plans to get seriously drunk at the wedding.
"And you, pure excuse for a man have ruined all that!" 🤬
@gemlog I've read a book on cybersecurity as a teenager so my passwords will take years to brute force. I remember getting these weird looks:
— Are you nuts, why is your password 20 characters long?!
— Best practice, you know… 🤭
But yes, disabling them completely is a valid point.
Using non-standard ports for ssh is also a good practice. Looking at cryptominers trying to get into your web server is entertaining, sshd — not so. And that "-p" doesn't make scripts less readable in a slightest.
@gemlog I'm still freaking out seeing it today. Especially when this happens to some machine you've set up years ago and now has life of its own. You realize it was going on for days and you're like: "Why the hell didn't fail2ban kick in?!" 😱
And fail2ban didn't kick in of course because it's so old that it doesn't even know what IPv6 is and it never occurred to you this could ever happen.
Yeah, this is what log monitoring is for 🤭
@gemlog
>discovered that user never tried that before
This is definitely on my top10 most frustrating things. When this happens in a script and it keeps prompting you to add fingerprint to known_hosts, but you don't have SSH_ASKPASS configured so you don't see that prompt. Then you try to ssh to the remote host to do the same and boom — here it is!
>Why don't computers do what I'm thinking
Because if we allow them to… _for some weird reason_ they always end up doing what Google wants, not you 😅
@sunchaser
Третья серия! Скоро надо будет посты снабжать кратким содержанием предыдущих, чтобы те, кто не смотрит сериал с самого начала, не терялись 🤣
Меня ещё немного начинают пугать его настроения на этой неделе каждый день в 4-5 утра:
https://mastodon.ml/@neural_meduza/109107531092334399
https://mastodon.ml/@neural_meduza/109101632821161349
Прослеживается нездоровая, но очень чёткая линия 😱
None
Just in case: DMs/PMs simply don't exist on this instance as concept — don't use them, use the other instance if you absolutely have to, or send an email to any address at m0xEE.Net or .Com or .Org, but I prefer keep most communication public.