@thor No, old people are using some weird shit that's even worse. Like WhatsApp, meh!
@neural_meduza Придётся уклоняться 🤷
@neural_meduza Скорее наоборот 😔
@neural_meduza Боюсь, что вот именно с миром и достатком в этот НГ в РФ будет напряжённая ситуация 😏
@aster
NixOS is the system that relies on containerization heavily and that inspired, Guix, right? Yes, that's pretty cool. Even better!
But most of us here are into bittorrent anyway. I have a dedicated box with Void PowerPC running transmission-daemon. There's no fun in seducing someone like that, I guess 😅
@newt
@sunchaser
Профессиональное выгорание налицо! И новости опасно похожими на реальные стали 😅
@neural_meduza
@aster Looks like I'll be staying for at least a week till this 40 Gb download get finished 😌
What are we having for dinner?
@thor At least you don't have to get the garbage collector involved 😁
@fcktheworld587
@thor
I don't remember it very well, but isn't it this movie's epitasis, the Vanilla Sky?
"When you sleep with someone, your body makes a promise whether you do or not" — it did have something like that, right?
Now that I think about it, it's not too uncommon 🤔
@gemlog@tilde.zone
> Determined actors will nmap you regardless
Keep them entertained with fake sshd's 🤣
I've seen this neat trick on Mikrotik routers, you set up a random port number and when you try to open it the packet still gets dropped, but it makes an opening in firewall for five minutes so you can ssh in from this address. To be honest, I think it's overkill, but it's really inventive!
> Some of those buildings don't even exist anymore even.
Ghost story passwords, nice vibes!
@thor
Got me! There are things even spell checker can't fix 😅
@thor
TBH it's not too hard to imagine that. Come on, they were engaged and all the relatives had plans to get seriously drunk at the wedding.
"And you, pure excuse for a man have ruined all that!" 🤬
@gemlog@tilde.zone I've read a book on cybersecurity as a teenager so my passwords will take years to brute force. I remember getting these weird looks:
— Are you nuts, why is your password 20 characters long?!
— Best practice, you know… 🤭
But yes, disabling them completely is a valid point.
Using non-standard ports for ssh is also a good practice. Looking at cryptominers trying to get into your web server is entertaining, sshd — not so. And that "-p" doesn't make scripts less readable in a slightest.
@gemlog@tilde.zone I'm still freaking out seeing it today. Especially when this happens to some machine you've set up years ago and now has life of its own. You realize it was going on for days and you're like: "Why the hell didn't fail2ban kick in?!" 😱
And fail2ban didn't kick in of course because it's so old that it doesn't even know what IPv6 is and it never occurred to you this could ever happen.
Yeah, this is what log monitoring is for 🤭
None
Just in case: DMs/PMs simply don't exist on this instance as concept — don't use them, use the other instance if you absolutely have to, or send an email to any address at m0xEE.Net or .Com or .Org, but I prefer keep most communication public.