Been a while since I used it, but what it does it does well. I wonder what the complexity is for a relatively mature app to have someone else pick up maintinance
Some dingbat that occasionally builds neat stuff without breaking others. The person running this public-but-not-promoted instance because reasons.
Been a while since I used it, but what it does it does well. I wonder what the complexity is for a relatively mature app to have someone else pick up maintinance
Indeed, I don’t particularly even want it to auto fill unless I give it the OK to do so, even if that’s as simple as a PIN.
I’ve got things worked up with bitwarden to a point where I can put in a short pin to unlock it after a timeout (usually set to 15 minutes) and it will pretty well always work so long as the fields for where the user/pass go are found cleanly.
That’s my go to for my quick scratch pad notes, generally something I only need for a one time deal.
I use the Bit Warden secure note feature for more permanent things.
If it is a more ongoing documentation deal that needs organization I like Bookstack.
All depends on the purpose one uses it for.
Question here, why do the cameras I need to only connect to that one? Using an extender won’t create a truly separate net, some might create a NAT to look separate but you can still connect from the extenders net to the host net.
WiFi continually beacons out to try and find previously connected networks and will select for the best signal from an AP it can reach. Extenders can be a trick if you’re sitting in the ‘crossover’ space between the extender and the back haul it connects to.
What you might try instead is one of those distributed AP systems like Unifi or similar where all the APs are controlled by a switch and work in unison. The one I have at least has an ability to disconnect someone if they drop below a certain level and migrate them to another AP without breaking the session states.
The other option that I can think of is just turning off the auto connect for the extender net and only using that manually.
Huh, odd that they don’t advertise it more then. Probably make the notion of selling it get less of a rep of desperate people needing money and more similar to donating blood as an altruistic thing, so you get more involved.
Wonder if they could save some time and not put the rest back, just give it to a zoo to feed vampire bats or something… 🤔
I’ve only donated a few times but from what I recall you can donate blood or sell plasma. Always struck me as weird but the difference is that they use the whole blood medically while the plasma only is used for research or commercial purposes. We do love to make a market for near everything possible here.
As for how much, not sure exactly since I haven’t done so myself but I get the impression it’s not huge, maybe $20-$50 each time.
Could just get a personal size boat to get accustomed to the feel of it. Be aware of the boom when you turn with the wind (jibe if I recall the term) lest you get whacked out the boat.
I looked about for it and the PG update basically involves creating a new folder to initialize and then exporting/importing the old DB, but haven’t successfully done so yet here.
Depends on the place. If someone is in a public facing role I’d expect it to be a bit more comprehensive.
They’re a part of the mix. Firewalls, Proxies, WAF (often built into a proxy), IPS, AV, and whatever intelligence systems one may like work together to do their tasks. Visibility of traffic is important as well as the management burden being low enough. I used to have to manually log into several boxes on a regular basis to update software, certs, and configs, now a majority of that is automated and I just get an email to schedule a restart if needed.
A reverse proxy can be a lot more than just host based routing though. Take something like a Bluecoat or F5 and look at the options on it. Now you might say it’s not a proxy then because it does X/Y/Z but at the heart of things creating that bridged intercept for the traffic is still the core functionality.
It depends on what your level of confidence and paranoia is. Things on the Internet get scanned constantly, I actually get routine reports from one of them that I noticed in the logs and hit them up via an associated website. Just take it as an expected that someone out there is going to try and see if admin/password gets into some login screen if it’s facing the web.
For the most part, so long as you keep things updated and use reputable and maintained software for your system the larger risk is going to come from someone clicking a link in the wrong email than from someone haxxoring in from the public internet.
I have a dozen services running on a myriad of ports. My reverse proxy setup allows me to map hostnames to those services and expose only 80/443 to the web, plus the fact that an entity needs to know a hostname now instead of just an exposed port. IPS signatures can help identify abstract hostname scans and the proxy can be configured to permit only designated sources. Reverse proxies also commonly get used to allow for SSL offloading to permit clear text observation of traffic between the proxy and the backing host. Plenty of other use cases for them out there too, don’t think of it as some one trick off/on access gateway tool
Disney used to do that a lot, ‘get it now before it goes back into the vault’ in some effort to make it special/get-it-while-you-can.
Having everything available all the time would leave them with little to put on a pedestal as a coming soon limited time thing. Just one person’s theory though.
Zabbix or Cacti are nice ways to draw maps that also serve a functional role in keeping track of the activity and alerting.
Looks like was just updated today pending transfer, so either the owner transferring registrars or someone took it over.
https://www.whois.com/whois/funkwhale.audio
Domain expired on the 19th, so it’s validly offline. Has always seemed to be a low-adoptiom platform, will have to see the status in the next few days.
Makes sense, I’m so accustomed to making virtual machines and such that it becomes just a thing but inevitably at some point admin access was required to create the hypervisor, the vnic, a virtual switch, etc. Without that restriction a piece of malware could readily exfiltrate data past a local protection by just making it’s own new pathway through on the fly or any number of other unpleasant things.
There is a separate thunderbird app from k-9 now, so apparently not just an update. Obnoxious though that the new app lists a bunch of collected data types while k-9 doesn’t list any. Maybe just a legacy thing since K-9 has been around forever and they didn’t list them originally, but still upsetting for the privacy minded.
TB:
K-9: