

Know what you’re running when you pipe to a bash script. Curl-bash pipes are a security mess.
Know what you’re running when you pipe to a bash script. Curl-bash pipes are a security mess.
Something that’s less annoying than Anubis is fail2ban tarpitting the scrapers by putting in a hidden honeypot page link that they follow, and adding the followers to fail2ban.
Why Radicale when you have a webdav-capable calendar in NC?
GNusysdlin
python3 -m http.server
Thing like this are why there’s a million settings in KDE; every dev is prepared for the inevitable “but I hate it, make it go away” complaint. Granted, this complainer was pretty respectful and threw in a donation to soften the blow. Most people just act entitled, like the dev personally affronted them with their update.
Because Arch requires human sacrifice.
I wonder why that RoboNope doesn’t just make a fail2ban entry for anything that accesses a disallowed url and drop them entirely.
Actually this look like it would do something similiar, then dumps them to fail2ban after the re-access the honeypot page too many times: https://petermolnar.net/article/anti-ai-nepenthes-fail2ban/
This is your cat on shrooms.
deleted by creator
20F isn’t much of a fluctuation anyway.
Don’t expose anything outside of the tailnet and 99% of the potential problems are gone. Noobs should not expose services across a firewall. Period.
That sounds like the way to do it. It’s under your control and it’ll always work.
And it’ll be bricked when their app shuts down.
I don’t get the sudden interest in Filebrowser. Never heard of the project before it went into Maintenance, now it seems like everyone wants to use it.
For some reason, when I registered my phone number for delivery notifications, it made a passkey and registered it with my account. It never prompted me to save the passkey, so I had no idea where it was supposed to be used. I immediately deleted it because I was concerned I wasn’t going to be able to log in if I logged out without knowing what that passkey was and had it in my password manager.
It’s an interesting filesystem, but you shouldn’t use it at this point unless you know what the hell you’re doing. You’ll need to be able to notice, report and help resolve bugs, and under no circumstances use it for production or where you can’t afford to lose some or all of the data on the partition.
I’m pretty familiar with TTech’s legacy, I just mention it because if the repos ever got compromised, it could be a shitshow. IDK what security measures the new maintainers use to secure their access or check PRs, but I get nervous when it’s as popular as it is and such a good vector for complicated installations that are hard to check out. I also don’t know the new maintainers from Adam.
Personally, I’d use the scripts as a guide for DIY.