One of my home servers was popped once, they stuck a new MOTD on there to let me know how foolish I was and I haven’t made that mistake since. So… yay greyhat?
One of my home servers was popped once, they stuck a new MOTD on there to let me know how foolish I was and I haven’t made that mistake since. So… yay greyhat?
For Chiefly reasons of course. Now whether or not that server is active in the cluster is another matter entirely, but hey if it makes him/her feel important /shrug
Figure ~45 minutes to run to the liquor store for a decent single malt, another ~25 minutes for the pizza rolls, quick power nap, wake up and redeploy. That’s about 2 hours.
Unix is the kind of friend who won’t bat an eye about holding your beer while you go and do something incredibly stupid
Many popular channels revised their content format as a direct consequence of the Wadsworth constant
What if Stevie Wonder is the only person around
This is a very interesting point that raises a lot of questions; does throwing something in the trash by definition relinquish my ownership? What if I throw something away by accident? Where is the demarcation between my owning something and WM taking ownership? Does it then pass on to whomever owns the landfill, or subsequently whoever might dig it out of the trash? You’ve done gone and wrinkled my brain for the weekend.
Should have paid for upgrade to a 10/8
Some questions come to mind:
Do you have a static IP address from your ISP?
Dynamic DNS?
Have you verified the listening service is a box you own?
Is there a reverse proxy set up?
Checked the edge router logs to see if it rebooted recently and reloaded firewall rules?
What else sits between your router and the listening server?
This could be any number of things, maybe this will help point you in the right direction.
Just make sure it is only accessible in trusted networks though!!
Aw you’re no fun. Next you’ll be telling me to block all emails over 500 miles.
We need more Abdullah Atalars in this world
For me it’s not about the traffic, more the log spam.
Generally I’ll have :22 enabled internally, and anything non-standard is defined in ~/.ssh/config
and shared out so I don’t have to remember things.
My phone is exclusively used to play Diablo
Do you also offer a service to get the recipes from food blogs without having to read an autobiography?
Edit: Didn’t notice you said your router can’t issue out two DNS servers. I’ve never heard of that.
Ugh. When I moved into my new place I bought a NetGear Orbi system to hold me over until I got my Ubiquiti gear put in place. Never again.
It’s well worth it for this reason alone. Unless you’re running a honeypot, getting that noise out of your access logs can provide more actionable data to work with for more persistent threats.
sungloc.utus