Shdwdrgn

joined 1 year ago
[–] Shdwdrgn@mander.xyz 5 points 10 months ago

Unfortunately there are people who really believe this way. The same people who think Trump is some sort of god and can do no wrong.

[–] Shdwdrgn@mander.xyz 18 points 10 months ago (2 children)

"I see disinfectant, where it knocks it [coronavirus] out in a minute—one minute—and is there a way we can do something like that by injection inside, or almost a cleaning. Because you see it [coronavirus] gets in the lungs and it does a tremendous number on the lungs, so it’d be interesting to check that."

There is nothing in his quote about taking taking the blood out first, he's talking about doing the cleaning inside the body. But lets assume for a brief moment that what you say is accurate, and someone is going to take out your blood and clean it with bleach.... THEN what? Now your blood is too toxic to put back in the body. Do you just kick back for a minimum of 24 hours while waiting for the chlorine to evaporate? It doesn't work if you only take out some of the blood, because it is constantly being mixed in your body, so you have to somehow completely drain a person without them dying. Now repeat that for 8 billion people, because this process would still do nothing to protect you from getting exposed again as soon as you walk in to a store.

You might also consider how covid would have gotten into the blood in the first place -- it entered the body through the lungs, and continues to grow there (which is why some many people had lung damage). So I guess while you're killing the patient by removing all their blood, you might as well take out the lungs and bleach them too? Who here can't hold their breath for 24+ hours? There's just no way any of this could ever be used as a serious treatment. Yeah covid deaths would drop overnight, but only because the "treatment" would have a 100% fatality rate.

[–] Shdwdrgn@mander.xyz 1 points 10 months ago

Yeah it's pretty much the same as virus scanners not catching everything -- you also need a malware scanner. Between the pair of tools I don't see a lot of unwanted content pop up in my browser, and there are a few paywalls on smaller sites that seem to get knocked down. I did run into one problem though, trying to pay my gas bill and the page required access to a site that was marked with high warnings in both add-ons. I think they finally changed it, but you would think anyone collecting money online would do better research into the tools they used.

[–] Shdwdrgn@mander.xyz 1 points 10 months ago (2 children)

I run uBlock Origin and Privacy Badger, one of those two must have blocked the paywall because I was able to read through the entire article.

[–] Shdwdrgn@mander.xyz 13 points 10 months ago

This right here. As a member of the OpenNIC project, I used to run an open resolver and this required a lot of hands-on maintenance. Basically what happens is someone sends a very small packet requesting the lookup of something which returns a huge amount of data (like DNSSEC records). They can make thousands of these requests in a short period, attempting to flood out the target domain's DNS servers and effectively take them offline, by using your open server as the attacker.

At the very least, you need to have strict rate-limiting controls on DNS lookups. And since the requests come in through UDP, they can spoof their IP address so you can't simply block an attacker. When I ran into this issue, I wrote up scripts to monitor for a lot of requests to the same domain name and outright block those until the attack stopped. It wasn't a great solution, but it did at least make sure my system wasn't contributing to an attack.

Your best bet is to only respond to DNS requests for your own domain(s). If you really want an open resolver, think about limiting it by creating some sort of sign-up method (for instance, ddns servers use a specific URL to register the changing IP of known users), but still keep the rate-limiting in place.

[–] Shdwdrgn@mander.xyz 3 points 10 months ago

I've always preferred Konsole because it handles several tabs pretty well and I keep a bunch open to my servers. The only issue I have with it is that it has a habit of detaching tabs if I click on one while my computer is running something heavy in the background.

[–] Shdwdrgn@mander.xyz 15 points 10 months ago

Let's not forget about Senator Ted "if it gets too damn cold, join me in Cancun" Cruz... The whole state is led by political winners.

[–] Shdwdrgn@mander.xyz 4 points 10 months ago

One of the things to consider is stability. For instance, if you want something that is always pushing out the latest versions of everything, choose something built from Ubuntu, but just keep in mind that the latest builds don't have a lot of testing and can have problems show up. On the other hand, if you want something that will be rock-solid all the time, pick Debian -- the releases are going to be much older, but they have been very well tested. However Ubuntu and Debian also have different levels of "newness" to choose from, so like in Debian you can choose 'stable' (the default), 'testing' (released for awhile but still might have issues), or 'sid' (brand new, not tested at all). Ubuntu I believe starts out somewhere between debian's testing and sid releases as its base, and gets newer from there, but as you can see even within one distribution you can have a lot of choices.

Now how does that relate in the real world? Well all distributions will have security releases, so if there is an new exploit out, you will see patches for that right away. Otherwise, for a server you are going to want something that doesn't blow up, but for a desktop you might want to see the latest updates and gadgets to play with.

Keep in mind that you can play around with various releases before installing them. Most will have a "Live CD" version you can download and boot from a memory stick, so you can see what their desktop looks like. You also have the option of installing them in a virtual machine -- under Windows a good option is VirtualBox, and under Linux a good option is KVM (this might require you to use the command line but it is extremely lightweight on your CPU). Also keep in mind that most distributions allow you to install multiple desktops that you can choose from when you log in, so you could install Gnome, Mate, and others at the same time and then go back later and uninstall the ones you didn't like. This is one of the most noticeable differences between distributions -- how they preconfigure each desktop environment to look by default, but you can always find info to change the view of each one so you can copy the exact features that you like from other distributions. This is one of the great things about Linux, you aren't completely stuck with one particular setup.

[–] Shdwdrgn@mander.xyz 8 points 10 months ago

"Please send an email to IT explaining why our server is offline"

IT responds "Why are you attempting to put egg salad in your server?"

Yeah this is a great plan to 'boost' productivity...

[–] Shdwdrgn@mander.xyz 4 points 10 months ago

Yes I am, as I'm sure you are aware that IP spoofing is pretty much only relevant where you are sending outgoing packets (like in a DDoS attack) and do not expect to receive any information back. If you need two-way communication over TCP, spoofing doesn't work because the returned information naturally gets routed back to the host of the real IP and not to the spoofed address. Obviously these attackers received some information back.

[–] Shdwdrgn@mander.xyz 4 points 10 months ago (2 children)

Perhaps a better question would be to ask why they are allowing 14k separate logins from (what was probably) the same IP address? If you ask any big email provider, they will tell you they immediately shut down any access from that IP due to suspicious behavior, while simultaneously resetting the passwords of all the accounts that appear to be compromised. Typically you should have records of the IPs used for previous logins so it's fairly simple to compare records having suspicious activity and see if the accounts in question had any previous relationships with each other. And once you have that information on hand you can use it to monitor the compromised accounts for any further login attempts by unknown IPs and then block THOSE addresses as well.

When you have that many active user accounts, you do not just settle for simply accepting the correct credentials.

[–] Shdwdrgn@mander.xyz 1 points 10 months ago (1 children)

No, I'm in the US, I just have seen almost no houses that didn't already have a 240V three-prong outlet installed for an oven. The places I have lived (except for that first apartment) didn't even have a gas line available to the kitchen. Maybe this is just an issue with much older homes along the East coast?

view more: ‹ prev next ›