IHawkMike

@[email protected]

This profile is from a federated server and may be incomplete. View on remote instance

IHawkMike ,

So now your ISP sees all of your queries instead of CF. (Assuming the cloudflared option is using DoH)

I'll trust Cloudflare over Comcast/AT&T/etc. any day of the week.

IHawkMike ,

I know plenty account SNI already, but thanks. You might want to study more yourself, since we're being condescending.

https://blog.cloudflare.com/encrypted-sni/

IHawkMike ,

Hyper-V is decent. It's VMM that is atrocious. Hopefully you don't have Citrix with MCS catalogs.

Networking Gear Recommendations? (starting from scratch)

Hi, I hope its appropriate to ask this here, considering this is the most active community closest to this topic (Networking). I am moving places shortly and will need to start from scratch will all networking equipment. Including router and wifi-extenders. Am wondering what the general consencus is around networking gear, what...

IHawkMike ,

I would never use their firewalls/gateways, but their switches are pretty good for the price and their APs are decent (although tbh after 3 generations my next AP will likely be an enterprise Aruba).

That said, I still use Unifi in docker, everything is up to date, and nothing is requiring a sign-in to the cloud. Am I missing something? If it's just the firewalls, then I'm not surprised since I've never been remotely tempted to use them, but it sure isn't all of their devices.

IHawkMike ,

Oh yeah, I had forgotten that too. UAC with separate elevated tokens and Session 0 isolation didn't even exist until Vista/2008.

IHawkMike ,

Same here. Parent poster needs to learn that other people have different needs and experiences than themselves.

IHawkMike ,

What is hard? Learning? Besides, you're only proving our point. Samsung (and the market) have determined that the "one size" that people want is the one without an S-pen.

But go ahead and downvote based on your feelings rather than facts. None of you own a foldable anyway so it's not like your opinions actually matter here.

IHawkMike ,

Lol okay. Where was I defending Samsung? This all started with OP stating "the point of a samsung flagship is access to the S-pen" and "this defeats the purpose of a foldable" as if it was universal truth. It is not.

But that how most people on Lemmy are, at least in the tech communities. They have no concept of nuance and are completely unable to see other points of view. They were wrong. You aren't even making coherent points. I am happily moving on.

IHawkMike ,

That's been my plan to move off of Google photos. Decided on Immich a few months ago. Now if only I had some more of that free time to set it up.

IHawkMike ,

Their country, their rules. One bullet can still kill someone. Play stupid games, win stupid prizes.

IHawkMike ,

That's good advice, especially when traveling internationally.

Also when traveling to another country, always check the state department's travel advisory for your destination(s).

https://travel.state.gov/content/travel/en/international-travel/International-Travel-Country-Information-Pages/TurksandCaicosIslands.html

https://lemmy.world/pictrs/image/850efa97-5b4a-42aa-85f9-df5194793d33.jpeg

Obviously this is the US state department, but it is still good info and I'd assume other countries have something similar.

IHawkMike ,

What the fuck are you on about? Are people traveling with an entire Lowe's warehouse in their fucking luggage?

"Hacked" Instagram

My other half discovered that some dodgy person/company had managed to send instagram messages advertising handbags to all of her followers from her account. She changed her password immediately, but what could have happened here? Is it the case that a “hacker” had access to her full instagram account, or would they have...

IHawkMike ,

Most likely it was a password stuffing attack. If they used the same password on multiple sites, there is a good chance one of those other sites was compromised and the attackers took the compromised credentials and tried them on other sites like Instagram. It could have been something more advanced like a stolen cookie, but usually the simplest explanation is most likely.

Always use a different password for each service, enable MFA where possible, and use a password vault like Bitwarden.

IHawkMike ,

You need to demand a raise. And keep working from home.

IHawkMike ,

I agree as long as the money is actually going toward building out the charging network and not just getting sucked up by corporations like the ISPs that were supposed to improve our network infrastructure.

Although it would be nice for them to let us know what is happening and when we can expect some real improvements. Maybe that info is out there, but I haven't seen it and this biased reporter sure isn't looking to do any real journalism.

IHawkMike ,

You said Traefik is getting certs from Cloudflare, but do you mean it's getting Let's Encrypt certs using a CF DNS challenge? And if that is the case, then your browser should trust the Traefik endpoint since LE certs are publicly trusted.

Are you sure you're hitting Traefik when you get a cert warning? You need to update your internal DNS if not.

IHawkMike ,

If you, Traefik, and your origin server are on the same network, then it's going to be one hop regardless of whether you're hitting the Traefik proxy or the origin server. If Traefik is serving up the origin server's cert and not the LE cert, then Traefik is misconfigured to pass through instead of proxy, but I'm still not sure that's the case as it's almost harder to configure it that way than the correct way as a proxy.

What IP:port is your origin server listening on, what IP:port is Traefik listening on, and how is Traefik configured to reach the origin server?

IHawkMike ,

In that case, if CF is taking to Traefik and not the actual origin server, you just need to forget about the origin certs altogether and use LE certs in Traefik.

IHawkMike ,

Right, because international hackers are going to mobilize boots on the ground across the world to steal your fucking Optiplex.

IHawkMike ,

And similarly, why can't Star Trek officers just set it to wide beam and/or just hold down the button while they paint the room?

IHawkMike ,

Exactly. Everybody on Lemmy a couple days ago was acting like the sky was falling when all we had were these one-paragraph FUD articles quoting Microsoft's own KB article. Most people commenting have no clue that "VPN" is a broad term covering at least a dozen different possible protocols and acted like Microsoft was intentionally breaking all VPNs.

The only thing I found was a reddit thread talking about how some VPNs using TPM-backed certs were broken. I, for one, am using an IPsec VPN with certs stored in TPM on one of the affected versions of Windows 11 and have had no problems. Nor have I had any issues with SSL or Wireguard-based VPNs, so it does just seem to be a fringe case they're warning about.

So Microsoft is just giving a heads-up that IT should probably include VPN testing in their patch cycle test rings and all the anti-MS people are losing their shit.

IHawkMike ,

The reality is they probably don't know the full scope or root cause and are going off of limited reporting coming from their beta channels.

But they likely determined the impact was low enough that they could still ship the update while they investigate further.

There are similar known issues reported in the update KBs all the time that sound much worse to me as an admin but are as equally low impact in the end. But they're not as easy for the layperson to latch onto like these low-effort "VPN no worky" articles.

Regardless, none of this absolves IT of the responsibility of testing patches.

IHawkMike ,

Yep totally. The documentation is downright wrong so much more today than it used to be. It's all written like they pawned it off on a junior engineer, who then threw shit at the wall until they got it working, then that process becomes the official documentation.

And don't get me started on Copilot hallucinating Powershell cmdlets.

With support it's become kind of a game to see how quick you can get to T2. My tactic is to passive aggressively point out how their first response shows a complete lack of understanding of the topic, then directly request escalation.

IHawkMike ,

The rootkit is easy enough to turn off in the BIOS but I highly, highly recommend G-Helper instead of Armoury Crate.

Moving to it from AC is like leaving a prison cell full of screaming children and entering a calm beach.

IHawkMike ,

ASAs are still way more prevalent than they should be when Palo Alto and others are much better options. Still, I'm glad I barely have to deal with them any more.

IHawkMike ,

I like returning 418 instead of 404 or 403 on the files the script kiddies are hunting for on my web servers. I'm sure it does nothing but I'd like to think I've wasted some of their time at least once.

I had to migrate from Samba AD to Windows Server AD and I'm sad (RIP Samba)

Samba is amazing, Windows server is a lot less so. The problem with Windows server is that it takes tons of steps to do basic things. On Samba I had Samba tool and it was very nice and friendly. On Windows server you have a ton of different management panels....

IHawkMike ,

You connect directly to the ESXi host with root. Because you're going to have to boot up vCenter in addition to the DC anyway when you're using SSO. I would use DRS rules to prefer host1 for vCenter and the PDCe for that reason.

Only in the very early days of virtualization (2008-2012) did I recommend keeping a physical server around. I know a lot more now than I did then.

But anymore, I don't recommend using SSO for hypervisors or backup infrastructure. It's better to add another wall in front of an attacker trying to laterally move onto these critical platforms for ransom, data exfiltration, etc.

And in reality, these "kaboom events" aren't terribly common unless you've neglected some other part of your infrastructure.

How do I setup my own FOSS shopping website for my business?

Hello, I don't have much experience in self-hosting, I'm buying a ProtonVPN subscription and would like to port forward. I have like no experience in self-hosting but a good amount in Linux. I'm planning on using Proxmox VE with a YunoHost VM. I already have a domain name from Njalla. I'm setting up a website for my computer...

IHawkMike ,

Third. The first thing I mention when one of my clients asks anything about PCI is to offload as much card processing onto third parties as possible.

And if you have nothing in place yet, then 100% offloaded should be possible (with the possible exception of secure payment terminals if you need to process physical cards).

That said, it is still possible to use your own hosted WordPress storefront and offload the payment processing via tokenization or redirection. But a turnkey solution like Shopify might be better if you lack the experience.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • kbinchat
  • All magazines